Exam 3: Block Ciphers and the Data Encryption Standard

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The vast majority of network based symmetric cryptographic applications make use of stream ciphers.

Free
(True/False)
4.9/5
(39)
Correct Answer:
Verified

False

The ________ cipher structure,which dates back over a quarter century and which,in turn,is based on Shannon's proposal of 1945,is the structure used by many significant symmetric block ciphers currently in use.

Free
(Essay)
4.8/5
(36)
Correct Answer:
Verified

Feistel

Feistel proposed that we can approximate the ideal block cipher by utilizing the concept of a __________ cipher,which is the execution of two or more simple ciphers in sequence in such a way that the final result or product is cryptographically stronger than any of the component ciphers.

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

D

Two alternatives to DES are AES and _________ DES.

(Essay)
4.8/5
(24)

A prime concern with DES has been its vulnerability to brute-force attack because of its relatively short key length.

(True/False)
4.9/5
(33)

A __________ cipher is one that encrypts a digital data stream one bit or one byte at a time.

(Multiple Choice)
4.9/5
(32)

The heart of a Feistel block cipher is the function F,which relies on the use of S-boxes.

(True/False)
4.9/5
(30)

__________ is when each plaintext element or group of elements is uniquely replaced by a corresponding ciphertext element or group of elements.

(Multiple Choice)
4.8/5
(32)

The Feistel cipher structure,based on Shannon's proposal of 1945, dates back over a quarter of a century and is the structure used by many significant symmetric block ciphers currently in use.

(True/False)
4.8/5
(32)

Key sizes of __________ or less are now considered to be inadequate.

(Multiple Choice)
4.9/5
(34)

A sequence of plaintext elements is replaced by a __________ of that sequence which means that no elements are added,deleted or replaced in the sequence,but rather the order in which the elements appear in the sequence is changed.

(Multiple Choice)
4.9/5
(37)

A __________ cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.

(Multiple Choice)
4.9/5
(38)

Confusion seeks to make the statistical relationship between the plaintext and ciphertext as complex as possible in order to thwart attempts to deduce the key.

(True/False)
4.8/5
(33)

In ___________ the statistical structure of the plaintext is dissipated into long-range statistics of the ciphertext.This is achieved by having each plaintext digit affect the value of many ciphertext digits.

(Essay)
4.9/5
(36)

All other things being equal,smaller block sizes mean greater security.

(True/False)
4.7/5
(37)

A problem with the ideal block cipher using a small block size is that it is vulnerable to a statistical analysis of the plaintext.

(True/False)
4.9/5
(37)

Greater complexity in the subkey generation algorithm should lead to greater difficulty of cryptanalysis.

(True/False)
4.8/5
(37)

The vast majority of network-based symmetric cryptographic applications make use of ________ ciphers.

(Multiple Choice)
4.9/5
(36)

DES exhibits the classic __________ block cipher structure,which consists of a number of identical rounds of processing.

(Multiple Choice)
4.8/5
(25)

If the bit-stream generator is a key-controlled algorithm the two users only need to share the generating key and then each can produce the keystream.

(True/False)
4.9/5
(36)
Showing 1 - 20 of 27
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)