Exam 6: Advanced Encryption Standard

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

the AES cipher begins and ends with a(n) _________ stage because any other stage, applied at the beginning or end, is reversible without knowledge of the key and Would add no security.

(Multiple Choice)
4.8/5
(31)

As with any block cipher, AES can be used to construct a message authentication code, and for this, only decryption is used.

(True/False)
4.7/5
(39)

AES can be implemented very efficiently on an 8-bit processor.

(True/False)
4.9/5
(38)

the final round of both encryption and decryption of the AES structure consists of __________ stages.

(Multiple Choice)
4.8/5
(31)

A polynomial m(x) is called __________ if and only if m(x) cannot be expressed as a product of two polynomials, both of degree lower than that of m(x).

(Short Answer)
4.8/5
(29)

In the AES structure both encryption and decryption ciphers begin with a(n) __________ stage, followed by nine rounds that each include all four stages, Followed by a tenth round of three stages.

(Multiple Choice)
4.9/5
(35)

AES uses a Feistel structure.

(True/False)
4.7/5
(28)

the first N - 1 rounds consist of four distinct transformation functions: SubBytes, ShiftRows, AddRoundKey, and __________ .

(Short Answer)
4.9/5
(35)

the Advanced Encryption Standard was published by the __________ in 2001.

(Multiple Choice)
4.8/5
(28)

the mix column transformation combined with the __________ transformation ensures that after a few rounds all output bits depend on all input bits.

(Short Answer)
4.7/5
(34)

A __________ is a set in which you can do addition, subtraction, multiplication and division without leaving the set.

(Multiple Choice)
4.8/5
(36)

the National Institute of Standards and technology chose the __________ design as the winning candidate for AES.

(Short Answer)
4.8/5
(32)

the inverse add round key transformation is identical to the forward add round key transformation because the XOR operation is its own inverse.

(True/False)
4.8/5
(38)

__________ affects the contents of bytes in State but does not alter byte sequence and does not depend on byte sequence to perform its transformation.

(Multiple Choice)
4.9/5
(32)

In the Advanced Encryption Standard the decryption algorithm is identical to the encryption algorithm.

(True/False)
4.9/5
(37)

the ordering of bytes within a matrix is by column.

(True/False)
4.8/5
(32)

the AES key expansion algorithm takes as input a four-word (16-byte) key and produces a linear array of __________ words (176 bytes).

(Short Answer)
4.7/5
(36)

the S-box is designed to be resistant to known cryptanalytic attacks.

(True/False)
4.8/5
(41)

InvSubBytes is the inverse of ShiftRows.

(True/False)
4.9/5
(32)

DES is a block cipher intended to replace AES for commercial applications.

(True/False)
4.9/5
(28)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)