Computer Science Homework Help
ITAS 663 AIU Online Unit 1 stream cipher and block cipher Discussion board
At the end of each unit, DB participation is assessed based on level of engagement and the quality of the contribution to the discussion. DBs allow learners to learn through sharing ideas and experiences as they relate to course content. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB are accepted after the end of the unit. Learners must demonstrate an appropriate depth of understanding of course content to receive credit for having submitted substantive posts. Typically, this is achieved with 3–4 strong paragraphs for Main Posts and 2–3 strong paragraphs for Response Posts.
Explain the following concepts:
- What is your understanding of the difference between a stream cipher and a block cipher?
- What are two ways to launch a cryptanalytic attack against a cipher (based upon what the attacker knows or has in possession)? Be sure to provide detailed examples.
- What is your understanding of the difference between an unconditionally secure cipher and a computationally secure cipher?
- Your organization has asked for a cryptographic algorithm recommendation for a new project that requires high-level security. What algorithm would you recommend and why?