Exam 7: Block Cipher Operation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

"the input to the encryption algorithm is the XOR of the next 64 bits of plaintext and the preceding 64 bits of ciphertext" is a description of __________ mode.

(Short Answer)
4.8/5
(36)

S-AES is the most widely used multiple encryption scheme.

(True/False)
4.9/5
(34)

Cipher Feedback (CFB) is used for the secure transmission of single values.

(True/False)
4.8/5
(30)

the__________ is a technique in which an encryption algorithm is used multiple times.

(Short Answer)
5.0/5
(47)

the _________ must be a data block that is unique to each execution of the encryption operation and may be a counter, a timestamp, or a message number.

(Short Answer)
4.9/5
(39)

the XtS-AES mode is based on the concept of a tweakable block cipher.

(True/False)
4.8/5
(32)

Format-preserving encryption refers to any encryption technique that takes a plaintext in a given format and produces a ciphertext in the same format.

(True/False)
4.8/5
(31)

the sender is the only one who needs to know an initialization vector.

(True/False)
4.9/5
(37)

__________ refers to any encryption technique that takes a plaintext in a given format and produces a ciphertext in the same format.

(Short Answer)
4.7/5
(26)

One of the most widely used multiple-encryption schemes is __________ .

(Short Answer)
4.8/5
(28)

the XtS-AES standard describes a method of decryption for data stored in sector-based devices where the threat model includes possible access to stored data by the adversary.

(True/False)
4.8/5
(36)

A __________ cipher can operate in real time and eliminates the need to pad a message to be an integral number of blocks.

(Short Answer)
4.8/5
(31)

In the first instance of multiple encryption plaintext is converted to __________ using the encryption algorithm.

(Multiple Choice)
4.8/5
(34)

the __________ method is ideal for a short amount of data and is the appropriate mode to use if you want to transmit a DES or AES key securely.

(Multiple Choice)
4.8/5
(35)

Both __________ produce output that is independent of both the plaintext and the ciphertext.this makes them natural candidates for stream ciphers that encrypt plaintext by XOR one full block at a time.

(Multiple Choice)
4.8/5
(40)

the output of the encryption function is fed back to the shift register in Output Feedback mode, whereas in ___________ the ciphertext unit is fed back to the shift register.

(Multiple Choice)
4.9/5
(49)

Five modes of operation have been standardized by NISt for use with symmetric block ciphers such as DES and AES: electronic codebook mode, cipher block chaining mode, cipher feedback mode, __________, and counter mode.

(Short Answer)
4.8/5
(25)

_________ mode is similar to Cipher Feedback, except that the input to the encryption algorithm is the preceding DES output.

(Multiple Choice)
4.8/5
(28)

__________ modes of operation have been standardized by NISt for use with symmetric block ciphers such as DES and AES.

(Multiple Choice)
4.9/5
(26)

the _________ and _________ block cipher modes of operation are used for authentication.

(Multiple Choice)
4.9/5
(27)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)