Exam 6: Advanced Encryption Standard
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
the AES cipher begins and ends with a(n) _________ stage because any other stage, applied at the beginning or end, is reversible without knowledge of the key and
Would add no security.
(Multiple Choice)
4.8/5
(31)
As with any block cipher, AES can be used to construct a message
authentication code, and for this, only decryption is used.
(True/False)
4.7/5
(39)
the final round of both encryption and decryption of the AES structure consists of __________ stages.
(Multiple Choice)
4.8/5
(31)
A polynomial m(x) is called __________ if and only if m(x) cannot be expressed as a product of two polynomials, both of degree lower than that of m(x).
(Short Answer)
4.8/5
(29)
In the AES structure both encryption and decryption ciphers begin with a(n) __________ stage, followed by nine rounds that each include all four stages,
Followed by a tenth round of three stages.
(Multiple Choice)
4.9/5
(35)
the first N - 1 rounds consist of four distinct transformation functions: SubBytes, ShiftRows, AddRoundKey, and __________ .
(Short Answer)
4.9/5
(35)
the Advanced Encryption Standard was published by the __________ in 2001.
(Multiple Choice)
4.8/5
(28)
the mix column transformation combined with the __________ transformation ensures that after a few rounds all output bits depend on all input bits.
(Short Answer)
4.7/5
(34)
A __________ is a set in which you can do addition, subtraction, multiplication and division without leaving the set.
(Multiple Choice)
4.8/5
(36)
the National Institute of Standards and technology chose the __________ design as the winning candidate for AES.
(Short Answer)
4.8/5
(32)
the inverse add round key transformation is identical to the
forward add round key transformation because the XOR
operation is its own inverse.
(True/False)
4.8/5
(38)
__________ affects the contents of bytes in State but does not alter byte sequence and does not depend on byte sequence to perform its transformation.
(Multiple Choice)
4.9/5
(32)
In the Advanced Encryption Standard the decryption algorithm is
identical to the encryption algorithm.
(True/False)
4.9/5
(37)
the AES key expansion algorithm takes as input a four-word (16-byte) key and produces a linear array of __________ words (176 bytes).
(Short Answer)
4.7/5
(36)
the S-box is designed to be resistant to known cryptanalytic
attacks.
(True/False)
4.8/5
(41)
DES is a block cipher intended to replace AES for commercial
applications.
(True/False)
4.9/5
(28)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)