Exam 2: Symmetric Encryption and Message Confidentiality

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

The _________ algorithm takes the ciphertext and the same secret key and produces the original plaintext.

(Short Answer)
4.8/5
(36)

Random numbers play an important role in the use of encryption for various network security applications.

(True/False)
4.9/5
(27)

The ________ source is drawn from the physical environment of the computer and could include things such as keystroke timing patterns, disk electrical activity, mouse movements, and instantaneous values of the system clock.

(Short Answer)
4.9/5
(37)

The principal drawback of 3DES is that the algorithm is relatively sluggish in software.

(True/False)
4.8/5
(36)

The three most important symmetric block ciphers are: triple DES (3DES), the Advanced Encryption Standard (AES), and the ___________ .

(Short Answer)
4.9/5
(30)

A PRNG takes as input a fixed value called the ________ and produces a sequence of output bits using a deterministic algorithm.

(Short Answer)
4.8/5
(25)

The primary advantage of a stream cipher is that stream ciphers are almost always faster and use far less code than do block ciphers.

(True/False)
4.7/5
(30)

Many symmetric block encryption algorithms including DES have a structure first described by _________ of IBM in 1973.

(Short Answer)
4.8/5
(40)

The security of symmetric encryption depends on the secrecy of the algorithm, not the secrecy of the key.

(True/False)
4.9/5
(32)
Showing 21 - 29 of 29
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)