Q1: Differentiate Between Conditional and Unconditional Security. Answer
Q1: Differentiate Between Conditional and Unconditional Security. Answer
Q1: Differentiate Between Conditional and Unconditional Security. Answer
A cipher that is unconditionally secure is one that is provably immune to compute power and to any
form of attack. The only such cipher I know of that qualifies is the One Time Pad (OTP).
To see how OTP works, imagine having a set of identical wheels, around which all of the keyboard
characters are arranged - say there are 80 characters on each wheel. By placing the wheels on a
single spindle, and rotating each wheel so that a specific character appears at the top of the wheel,
you could “spell out” any message that you could ever type on a keyboard.
Keeping algorithms secret may act as a significant barrier to cryptanalysis, but only if such
algorithms are used in a strictly limited circle, which protects the algorithm from being
revealed. Most government ciphers are kept secret. Commercial encryption algorithms,
released to the market, have mostly been broken quite swiftly.
Kerckhoffs's principle was reformulated (perhaps independently) by Claude Shannon as "The enemy
knows the system". In that form it is called Shannon's maxim.
Key generation
Key registration
Key storage
Key distribution and installation
Key use
Key rotation
Key backup
Key recovery
Key revocation
Key suspension
Key destruction