Exam 3: Block Ciphers and the Data Encryption Standard
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
The vast majority of network based symmetric cryptographic applications make use of stream ciphers.
Free
(True/False)
4.9/5
(39)
Correct Answer:
False
The ________ cipher structure,which dates back over a quarter century and which,in turn,is based on Shannon's proposal of 1945,is the structure used by many significant symmetric block ciphers currently in use.
Free
(Essay)
4.8/5
(36)
Correct Answer:
Feistel
Feistel proposed that we can approximate the ideal block cipher by utilizing the concept of a __________ cipher,which is the execution of two or more simple ciphers in sequence in such a way that the final result or product is cryptographically stronger than any of the component ciphers.
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
D
A prime concern with DES has been its vulnerability to brute-force attack because of its relatively short key length.
(True/False)
4.9/5
(33)
A __________ cipher is one that encrypts a digital data stream one bit or one byte at a time.
(Multiple Choice)
4.9/5
(32)
The heart of a Feistel block cipher is the function F,which relies on the use of S-boxes.
(True/False)
4.9/5
(30)
__________ is when each plaintext element or group of elements is uniquely replaced by a corresponding ciphertext element or group of elements.
(Multiple Choice)
4.8/5
(32)
The Feistel cipher structure,based on Shannon's proposal of 1945, dates back over a quarter of a century and is the structure used by many significant symmetric block ciphers currently in use.
(True/False)
4.8/5
(32)
Key sizes of __________ or less are now considered to be inadequate.
(Multiple Choice)
4.9/5
(34)
A sequence of plaintext elements is replaced by a __________ of that sequence which means that no elements are added,deleted or replaced in the sequence,but rather the order in which the elements appear in the sequence is changed.
(Multiple Choice)
4.9/5
(37)
A __________ cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.
(Multiple Choice)
4.9/5
(38)
Confusion seeks to make the statistical relationship between the plaintext and ciphertext as complex as possible in order to thwart attempts to deduce the key.
(True/False)
4.8/5
(33)
In ___________ the statistical structure of the plaintext is dissipated into long-range statistics of the ciphertext.This is achieved by having each plaintext digit affect the value of many ciphertext digits.
(Essay)
4.9/5
(36)
All other things being equal,smaller block sizes mean greater security.
(True/False)
4.7/5
(37)
A problem with the ideal block cipher using a small block size is that it is vulnerable to a statistical analysis of the plaintext.
(True/False)
4.9/5
(37)
Greater complexity in the subkey generation algorithm should lead to greater difficulty of cryptanalysis.
(True/False)
4.8/5
(37)
The vast majority of network-based symmetric cryptographic applications make use of ________ ciphers.
(Multiple Choice)
4.9/5
(36)
DES exhibits the classic __________ block cipher structure,which consists of a number of identical rounds of processing.
(Multiple Choice)
4.8/5
(25)
If the bit-stream generator is a key-controlled algorithm the two users only need to share the generating key and then each can produce the keystream.
(True/False)
4.9/5
(36)
Showing 1 - 20 of 27
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)