Exam 20: Symmetric Encryption and Message Confidentiality

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Key distribution can be achieved for two parties A and B by a thirdparty selecting the key and physically delivering it to A and B.

(True/False)
4.7/5
(34)

For general-purpose stream-oriented transmission you would typically use _______ mode.

(Multiple Choice)
4.9/5
(36)

__________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.

(Multiple Choice)
4.8/5
(34)

A ________ is a key used between entities for the purpose of distributing session keys.

(Multiple Choice)
4.9/5
(27)

With _________ encryption the encryption process is carried out at the two end systems.

(Short Answer)
4.7/5
(37)

All encryption algorithms are based on two general principles: substitution and _________.

(Short Answer)
4.8/5
(29)

______ mode is typically used for a general-purpose block-oriented transmission and is useful for high-speed requirements.

(Multiple Choice)
4.8/5
(42)

There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used.

(Multiple Choice)
4.7/5
(35)

The three most important symmetric block ciphers are: 3DES, AES, and _____.

(Short Answer)
4.8/5
(26)

The _________ was issued as a federal information-processing standard and is intended to replace DES and 3DES with an algorithm that is more secure and efficient.

(Short Answer)
4.7/5
(33)

_________ is the original message or data that is fed into the algorithm as input.

(Multiple Choice)
4.8/5
(24)

The National Bureau of Standards is now the National Institute ofStandards and Technology.

(True/False)
4.7/5
(34)

A symmetric encryption scheme has five ingredients: plaintext, encryption algorithm, ciphertext, decryption algorithm and _________.

(Short Answer)
4.8/5
(44)

The exact substitutions and transformations performed by the algorithm depend on the ________.

(Multiple Choice)
4.8/5
(34)

Cryptographic systems are generically classified by _________.

(Multiple Choice)
4.8/5
(31)

"The plaintext is 64 bits in length and the key is 56 bits in length;longer plaintext amounts are processed in 64-bit blocks" is a description of the DES algorithm.

(True/False)
4.8/5
(34)

The most powerful, and most common, approach to countering the threats to network security is ________.

(Short Answer)
4.8/5
(39)

Stream ciphers are far more common than block ciphers.

(True/False)
4.7/5
(42)

AES uses a Feistel structure.

(True/False)
4.7/5
(40)

One disadvantage of the link encryption approach is that the messagemust be decrypted each time it enters a frame switch.

(True/False)
4.9/5
(37)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)