Exam 7: Block Cipher Operation
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
"the input to the encryption algorithm is the XOR of the next 64 bits of plaintext and the preceding 64 bits of ciphertext" is a description of __________ mode.
(Short Answer)
4.8/5
(36)
Cipher Feedback (CFB) is used for the secure transmission of
single values.
(True/False)
4.8/5
(30)
the__________ is a technique in which an encryption algorithm is used multiple times.
(Short Answer)
5.0/5
(47)
the _________ must be a data block that is unique to each execution of the encryption operation and may be a counter, a timestamp, or a message number.
(Short Answer)
4.9/5
(39)
the XtS-AES mode is based on the concept of a tweakable block
cipher.
(True/False)
4.8/5
(32)
Format-preserving encryption refers to any encryption technique
that takes a plaintext in a given format and produces a ciphertext in the same format.
(True/False)
4.8/5
(31)
the sender is the only one who needs to know an initialization
vector.
(True/False)
4.9/5
(37)
__________ refers to any encryption technique that takes a plaintext in a given format and produces a ciphertext in the same format.
(Short Answer)
4.7/5
(26)
One of the most widely used multiple-encryption schemes is __________ .
(Short Answer)
4.8/5
(28)
the XtS-AES standard describes a method of decryption for data
stored in sector-based devices where the threat model includes
possible access to stored data by the adversary.
(True/False)
4.8/5
(36)
A __________ cipher can operate in real time and eliminates the need to pad a message to be an integral number of blocks.
(Short Answer)
4.8/5
(31)
In the first instance of multiple encryption plaintext is converted to __________ using the encryption algorithm.
(Multiple Choice)
4.8/5
(34)
the __________ method is ideal for a short amount of data and is the appropriate mode to use if you want to transmit a DES or AES key securely.
(Multiple Choice)
4.8/5
(35)
Both __________ produce output that is independent of both the plaintext and the ciphertext.this makes them natural candidates for stream ciphers that encrypt plaintext by XOR one full block at a time.
(Multiple Choice)
4.8/5
(40)
the output of the encryption function is fed back to the shift register in Output Feedback mode, whereas in ___________ the ciphertext unit is fed back to the shift register.
(Multiple Choice)
4.9/5
(49)
Five modes of operation have been standardized by NISt for use with symmetric block ciphers such as DES and AES: electronic codebook mode, cipher block chaining mode, cipher feedback mode, __________, and counter mode.
(Short Answer)
4.8/5
(25)
_________ mode is similar to Cipher Feedback, except that the input to the encryption algorithm is the preceding DES output.
(Multiple Choice)
4.8/5
(28)
__________ modes of operation have been standardized by NISt for use with symmetric block ciphers such as DES and AES.
(Multiple Choice)
4.9/5
(26)
the _________ and _________ block cipher modes of operation are used for authentication.
(Multiple Choice)
4.9/5
(27)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)