Exam 7: Block Cipher Operation
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
It is possible to convert a block cipher into a stream cipher using
cipher feedback, output feedback and counter modes.
Free
(True/False)
4.9/5
(33)
Correct Answer:
True
triple DES makes use of __________ stages of the DES algorithm, using a total of two or three distinct keys.
Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
D
the plaintext of a sector or data unit is organized in to blocks of 128 bits.For encryption and decryption, each block is treated independently.the only exception occurs when the last block has less than 128 bits.In that case the last two blocks are encrypted/decrypted using a ___________ technique instead of padding.
Free
(Short Answer)
4.8/5
(34)
Correct Answer:
ciphertext-stealing
__________ mode is suitable for parallel operation.Because there is no chaining, multiple blocks can be encrypted or decrypted simultaneously.Unlike CtR mode, this mode includes a nonce as well as a counter.
(Multiple Choice)
4.8/5
(37)
A __________ is a technique for enhancing the effect of a cryptographic algorithm or adapting the algorithm for an application, such as applying a block cipher to a sequence of data blocks or a data stream.
(Short Answer)
4.8/5
(25)
the __________ mode operates on full blocks of plaintext and ciphertext, as opposed to an s-bit subset.
(Multiple Choice)
4.8/5
(34)
OFB mode requires an initialization vector that must be unique to
each execution of the encryption operation.
(True/False)
4.9/5
(34)
the __________ algorithm will work against any block encryption cipher and does not depend on any particular property of DES.
(Multiple Choice)
4.8/5
(31)
the simplest mode of operation is the ___________ mode, in which plaintext is handled one block at a time and each block of plaintext is encrypted using the same key.
(Short Answer)
4.9/5
(34)
the __________ standard describes a method of encryption for data stored in sector-based devices where the threat model includes possible access to stored data by the adversary.Some characteristics of this standard include: the ciphertext is freely available for an attacker, the data layout is not changed on the storage medium and in transit, and the same plaintext is encrypted to different ciphertexts at different locations.
(Short Answer)
4.8/5
(41)
Another important mode, XtS-AES, has been standardized by the __________ Security in Storage Working Group.
(Multiple Choice)
4.8/5
(38)
A number of Internet based applications have adopted two-key
3DES, including PGP and S/MIME.
(True/False)
4.8/5
(37)
the __________ block cipher mode of operation is a general purpose block oriented transmission useful for high speed requirements.
(Short Answer)
4.9/5
(35)
Once the plaintext is converted to ciphertext using the
encryption algorithm the plaintext is then used as input and the algorithm is applied again.
(True/False)
4.8/5
(35)
"Input is processed s bits at a time.Preceding ciphertext is used as input to the encryption algorithm to produce pseudorandom output, which is XORed with plaintext to produce next unit of ciphertext", is a description of the _________ mode of operation.
(Short Answer)
4.8/5
(36)
A mode of operation is a technique for enhancing the effect of a
cryptographic algorithm or adapting the algorithm for an application.
(True/False)
4.7/5
(43)
A typical application of Output Feedback mode is stream oriented
transmission over noisy channel, such as satellite communication.
(True/False)
4.9/5
(31)
the most significant characteristic of __________ is that if the same b-bit block of plaintext appears more than once in the message, it always produces the same ciphertext.
(Short Answer)
4.7/5
(38)
"Each block of plaintext is XORed with an encrypted counter.the counter is incremented for each subsequent block", is a description of ___________ mode.
(Multiple Choice)
4.8/5
(33)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)