Exam 6: Advanced Encryption Standard

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

the cipher consists of N rounds, where the number of rounds depends on the __________ .

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

A

the first row of State is not altered; for the second row a 1-byte circular left shift is performed; for the third row a 2-byte circular left shift is performed; and For the fourth row a 3-byte circular left shift is performe D.this transformation Is called __________ .

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

B

the Rijndael developers designed the expansion key algorithm to be resistant to known cryptanalytic attacks.

Free
(True/False)
4.8/5
(44)
Correct Answer:
Verified

True

the transformations AddRoundKey and InvMixColumn alter the sequence of bytes in State.

(True/False)
4.9/5
(31)

the __________ is when a small change in plaintext or key produces a large change in the ciphertext.

(Multiple Choice)
4.8/5
(29)

___________ affects the sequence of bytes in State but does not alter byte contents and does not depend on byte contents to perform its transformation.

(Short Answer)
4.9/5
(34)

the cipher consists of N rounds, where the number of rounds depends on the __________ .

(Short Answer)
4.8/5
(43)

In Advanced Encryption Standard all operations are performed on __________ bytes.

(Multiple Choice)
4.8/5
(25)

the __________ is a block cipher intended to replace DES for commercial applications.It uses a 128-bit block size and a key size of 128, 192, or 256 bits.

(Short Answer)
4.8/5
(39)

At each horizontal point, State is the same for both encryption and decryption.

(True/False)
4.9/5
(39)

the encryption round has the structure:

(Multiple Choice)
4.7/5
(36)

the nonlinearity of the S-box is due to the use of the multiplicative inverse.

(True/False)
4.7/5
(29)

In the AddRoundKey transformation the 128 bits of State are bitwise XORed with the _________ of the round key.

(Multiple Choice)
4.9/5
(39)

AES processes the entire data block as a single matrix during each round using __________ and permutation.

(Short Answer)
4.9/5
(43)

In AES, the arithmetic operations of addition, multiplication and division are performed over the finite field _________ .

(Multiple Choice)
4.7/5
(37)

the forward substitute byte transformation, called _________ , is a simple table lookup.

(Short Answer)
4.9/5
(28)

Division requires that each nonzero element have a(n) __________ inverse.

(Multiple Choice)
4.9/5
(39)

the four separate functions of the Advanced Encryption Standard are: permutation, arithmetic operations over a finite field, XOR with a key, and __________ .

(Short Answer)
5.0/5
(37)

An example of a finite field is the set Zp consisting of all the integers {0, 1, ..., p - 1}, where p is a __________ and in which arithmetic is carried out modulo p.

(Short Answer)
4.9/5
(39)

the _________ transformation operates on each column individually.Each byte of a column is mapped into a new value that is a function of all four bytes in that column.

(Short Answer)
4.9/5
(34)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)