Exam 2: Symmetric Encryption and Message Confidentiality

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Three broad categories of cryptographic algorithms are commonly used to create PRNGs: Asymmetric ciphers, Hash functions and message authentication codes, and ___________ .

Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Verified

Symmetric block ciphers

A _________ cipher processes the plaintext input in fixed sized blocks and produces a block of ciphertext of equal size for each plaintext block.

Free
(Short Answer)
4.8/5
(20)
Correct Answer:
Verified

block

The process of attempting to discover the plaintext or key is known as _________ .

Free
(Short Answer)
4.9/5
(31)
Correct Answer:
Verified

cryptanalysis

The Feistel structure is a particular example of the more general structure used by all symmetric block ciphers.

(True/False)
4.8/5
(32)

The ciphertext-only attack is the easiest to defend against because the opponent has the least amount of information to work with.

(True/False)
4.9/5
(29)

Ciphertext is the scrambled message produced as output.

(True/False)
4.8/5
(26)

The essence of a symmetric block cipher is that a single round offers inadequate security but that multiple rounds offer increasing security.

(True/False)
4.8/5
(40)

With the use of symmetric encryption, the principal security problem is maintaining the secrecy of the _________ .

(Short Answer)
4.9/5
(39)

AES uses a Feistel structure.

(True/False)
4.9/5
(36)

Smaller block sizes mean greater security but reduced encryption/decryption speed.

(True/False)
4.9/5
(31)

Also referred to as conventional encryption, secret-key, or single-key encryption, _________ encryption was the only type of encryption in use prior to the development of public-key encryption in the late 1970's.

(Short Answer)
4.8/5
(27)

The most commonly used symmetric encryption algorithms are stream ciphers.

(True/False)
4.9/5
(36)

An encryption scheme is __________ if the cost of breaking the cipher exceeds the value of the encrypted information and/or the time required to break the cipher exceeds the useful lifetime of the information.

(Short Answer)
4.8/5
(30)

All encryption algorithms are based on two general principles: _________, in which each element in the plaintext is mapped into another element, and transposition, in which elements in the plaintext are rearranged.

(Short Answer)
4.8/5
(32)

Two requirements for secure use of symmetric encryption are: sender and receiver must have obtained copies of the secret key in a secure fashion and a strong __________ is needed.

(Short Answer)
4.8/5
(36)

In the _________ mode the input to the encryption algorithm is the XOR of the current plaintext block and the preceeding ciphertext block; the same key is used for each block.

(Short Answer)
4.8/5
(38)

The advantage of a block cipher is that you can reuse keys.

(True/False)
4.8/5
(33)

__________ is a stream cipher used in the Secure Sockets Layer/Transport Layer Security standards that have been defined for communication between Web browsers and servers and is also used in WEP and WPA protocols.

(Short Answer)
4.8/5
(39)

Public-key encryption is also referred to as conventional encryption, secret-key, or single-key encryption.

(True/False)
4.9/5
(40)

Triple DES was first standardized for use in financial applications in ANSI standard X9.17 in 1985.

(True/False)
5.0/5
(41)
Showing 1 - 20 of 29
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)