Deck 5: Advanced Encryption Standard
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 5: Advanced Encryption Standard
1
The S-box is designed to be resistant to known cryptanalytic attacks.
True
2
In Advanced Encryption Standard all operations are performed on __________ bytes.
A)8-bit
B)16-bit
C)32-bit
D)4-bit
A)8-bit
B)16-bit
C)32-bit
D)4-bit
A
3
The Rijndael developers designed the expansion key algorithm to be resistant to known cryptanalytic attacks.
True
4
The Advanced Encryption Standard was published by the __________ in 2001.
A)ARK
B)FIPS
C)IEEE
D)NIST
A)ARK
B)FIPS
C)IEEE
D)NIST
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
AES uses a Feistel structure.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
The AES cipher begins and ends with an)_________ stage because any other stage, applied at the beginning or end,is reversible without knowledge of the key and would add no security.
A)Substitute bytes
B)AddRoundKey
C)MixColumns
D)ShiftRows
A)Substitute bytes
B)AddRoundKey
C)MixColumns
D)ShiftRows
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Compared to public-key ciphers such as RSA,the structure of AES and most symmetric ciphers is quite complex and cannot be explained as easily as many other cryptographic algorithms.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
In the Advanced Encryption Standard the decryption algorithm is identical to the encryption algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Division requires that each nonzero element have an)__________ inverse.
A)multiplicative
B)divisional
C)subtraction
D)addition
A)multiplicative
B)divisional
C)subtraction
D)addition
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
InvSubBytes is the inverse of ShiftRows.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
The transformations AddRoundKey and InvMixColumn alter the sequence of bytes in State.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The ordering of bytes within a matrix is by column.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
A __________ is a set in which you can do addition,subtraction,multiplication and division without leaving the set.
A)record
B)standard
C)field
D)block
A)record
B)standard
C)field
D)block
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
DES is a block cipher intended to replace AES for commercial applications.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
AES can be implemented very efficiently on an 8-bit processor.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The nonlinearity of the S-box is due to the use of the multiplicative inverse.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
At each horizontal point,State is the same for both encryption and decryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Virtually all encryption algorithms,both conventional and public- key,involve arithmetic operations on integers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
As with any block cipher,AES can be used to construct a message authentication code,and for this,only decryption is used.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The inverse add round key transformation is identical to the forward add round key transformation because the XOR operation is its own inverse.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
In AES,the arithmetic operations of addition,multiplication and division are performed over the finite field _________ .
A)Zp
B)a/b = ab-1)
C)GF2n-1)
D)GF28)
A)Zp
B)a/b = ab-1)
C)GF2n-1)
D)GF28)
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
The cipher consists of N rounds,where the number of rounds depends on the __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
The cipher consists of N rounds,where the number of rounds depends on the __________ .
A)key length
B)output matrix
C)State
D)number of columns
A)key length
B)output matrix
C)State
D)number of columns
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
In the general structure of the AES encryption process the input to the encryption and decryption algorithms is a single _________ block.
A)32-bit
B)256-bit
C)128-bit
D)64-bit
A)32-bit
B)256-bit
C)128-bit
D)64-bit
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The mix column transformation combined with the __________ transformation ensures that after a few rounds all output bits depend on all input bits.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
The forward substitute byte transformation,called _________ ,is a simple table lookup.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
AES processes the entire data block as a single matrix during each round using __________ and permutation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The final round of both encryption and decryption of the AES structure consists of __________ stages.
A)one
B)two
C)four
D)three
A)one
B)two
C)four
D)three
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The AES key expansion algorithm takes as input a four-word 16-byte)key and produces a linear array of __________ words 176 bytes).
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The __________ is a block cipher intended to replace DES for commercial applications.It uses a 128-bit block size and a key size of 128,192,or 256 bits.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The __________ is when a small change in plaintext or key produces a large change in the ciphertext.
A)avalanche effect
B)Rcon
C)key expansion
D)auxiliary exchange
A)avalanche effect
B)Rcon
C)key expansion
D)auxiliary exchange
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The first row of State is not altered;for the second row a 1-byte circular left shift is performed;for the third row a 2-byte circular left shift is performed;and for the fourth row a 3-byte circular left shift is performed.This transformation is called __________ .
A)AddRoundKey
B)ShiftRows
C)MixColumns
D)Substitute bytes
A)AddRoundKey
B)ShiftRows
C)MixColumns
D)Substitute bytes
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The four separate functions of the Advanced Encryption Standard are: permutation,arithmetic operations over a finite field,XOR with a key,and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
In the AES structure both encryption and decryption ciphers begin with an) __________ stage,followed by nine rounds that each include all four stages, followed by a tenth round of three stages.
A)Substitute bytes
B)AddRoundKey
C)MixColumns
D)ShiftRows
A)Substitute bytes
B)AddRoundKey
C)MixColumns
D)ShiftRows
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
__________ affects the contents of bytes in State but does not alter byte sequence and does not depend on byte sequence to perform its transformation.
A)InvSubBytes
B)ShiftRows
C)SubBytes
D)InvShiftRows
A)InvSubBytes
B)ShiftRows
C)SubBytes
D)InvShiftRows
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The _________ transformation operates on each column individually.Each byte of a column is mapped into a new value that is a function of all four bytes in that column.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The National Institute of Standards and Technology chose the __________ design as the winning candidate for AES.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The encryption round has the structure:
A)ShiftRows,MixColumns,SubBytes,InvMixColumns
B)SubBytes,ShiftRows,MixColumns,AddRoundKey
C)MixColumns,ShiftRows,SubBytes,AddRoundKey
D)InvShiftRows,InvSubBytes,AddRoundKey,InvMixColumns
A)ShiftRows,MixColumns,SubBytes,InvMixColumns
B)SubBytes,ShiftRows,MixColumns,AddRoundKey
C)MixColumns,ShiftRows,SubBytes,AddRoundKey
D)InvShiftRows,InvSubBytes,AddRoundKey,InvMixColumns
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
The first N - 1 rounds consist of four distinct transformation functions: SubBytes,ShiftRows,AddRoundKey,and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
In the AddRoundKey transformation the 128 bits of State are bitwise XORed with the _________ of the round key.
A)256 bits
B)128 bits
C)64 bits
D)512 bits
A)256 bits
B)128 bits
C)64 bits
D)512 bits
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
___________ affects the sequence of bytes in State but does not alter byte contents and does not depend on byte contents to perform its transformation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A more efficient implementation can be achieved for a 32-bit processor if operations are defined on _________ words.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The standard decryption round has the structure InvShiftRows,InvSubBytes,__________,InvMixColumns.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
An example of a finite field is the set Zp consisting of all the integers {0,1,... ,p - 1},where p is a __________ and in which arithmetic is carried out modulo p.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
A polynomial mx)is called __________ if and only if mx)cannot be expressed as a product of two polynomials,both of degree lower than that of mx).
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck