Exam 6: Advanced Encryption Standard
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
the cipher consists of N rounds, where the number of rounds depends on the __________ .
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
A
the first row of State is not altered; for the second row a 1-byte circular left shift is performed; for the third row a 2-byte circular left shift is performed; and
For the fourth row a 3-byte circular left shift is performe D.this transformation
Is called __________ .
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
B
the Rijndael developers designed the expansion key algorithm to
be resistant to known cryptanalytic attacks.
Free
(True/False)
4.8/5
(44)
Correct Answer:
True
the transformations AddRoundKey and InvMixColumn alter the
sequence of bytes in State.
(True/False)
4.9/5
(31)
the __________ is when a small change in plaintext or key produces a large change in the ciphertext.
(Multiple Choice)
4.8/5
(29)
___________ affects the sequence of bytes in State but does not alter byte contents and does not depend on byte contents to perform its transformation.
(Short Answer)
4.9/5
(34)
the cipher consists of N rounds, where the number of rounds depends on the __________ .
(Short Answer)
4.8/5
(43)
In Advanced Encryption Standard all operations are performed on __________ bytes.
(Multiple Choice)
4.8/5
(25)
the __________ is a block cipher intended to replace DES for commercial applications.It uses a 128-bit block size and a key size of 128, 192, or 256 bits.
(Short Answer)
4.8/5
(39)
At each horizontal point, State is the same for both encryption and
decryption.
(True/False)
4.9/5
(39)
the nonlinearity of the S-box is due to the use of the multiplicative
inverse.
(True/False)
4.7/5
(29)
In the AddRoundKey transformation the 128 bits of State are bitwise XORed with the _________ of the round key.
(Multiple Choice)
4.9/5
(39)
AES processes the entire data block as a single matrix during each round using __________ and permutation.
(Short Answer)
4.9/5
(43)
In AES, the arithmetic operations of addition, multiplication and division are performed over the finite field _________ .
(Multiple Choice)
4.7/5
(37)
the forward substitute byte transformation, called _________ , is a simple table lookup.
(Short Answer)
4.9/5
(28)
Division requires that each nonzero element have a(n) __________ inverse.
(Multiple Choice)
4.9/5
(39)
the four separate functions of the Advanced Encryption Standard are: permutation, arithmetic operations over a finite field, XOR with a key, and __________ .
(Short Answer)
5.0/5
(37)
An example of a finite field is the set Zp consisting of all the integers {0, 1, ..., p - 1}, where p is a __________ and in which arithmetic is carried out modulo p.
(Short Answer)
4.9/5
(39)
the _________ transformation operates on each column individually.Each byte of a column is mapped into a new value that is a function of all four bytes in that column.
(Short Answer)
4.9/5
(34)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)