Deck 3: Block Ciphers and the Data Encryption Standard

Full screen (f)
exit full mode
Question
All other things being equal,smaller block sizes mean greater security.
Use Space or
up arrow
down arrow
to flip the card.
Question
An advantage of key-dependent S-boxes is that because they are not fixed,it is impossible to analyze the S-boxes ahead of time to look for weaknesses.
Question
Greater complexity in the subkey generation algorithm should lead to greater difficulty of cryptanalysis.
Question
DES exhibits the classic __________ block cipher structure,which consists of a number of identical rounds of processing.

A)Feistel
B)SAC
C)Shannon
D)Rendell
Question
A prime concern with DES has been its vulnerability to brute-force attack because of its relatively short key length.
Question
__________ is when each plaintext element or group of elements is uniquely replaced by a corresponding ciphertext element or group of elements.

A)Substitution B)Diffusion
C)Streaming
D)Permutation
Question
A problem with the ideal block cipher using a small block size is that it is vulnerable to a statistical analysis of the plaintext.
Question
The Feistel cipher structure,based on Shannon's proposal of 1945, dates back over a quarter of a century and is the structure used by many significant symmetric block ciphers currently in use.
Question
The vast majority of network based symmetric cryptographic applications make use of stream ciphers.
Question
Fast software encryption/decryption and ease of analysis are two considerations in the design of a Feistel cipher.
Question
A __________ cipher is one that encrypts a digital data stream one bit or one byte at a time.

A)product
B)block
C)key
D)stream
Question
One criteria for an S-box is: "If two inputs to an S-box differ in exactly one bit,the outputs must also differ in exactly one bit."
Question
The heart of a Feistel block cipher is the function F,which relies on the use of S-boxes.
Question
The strict avalanche criterion and the bit independence criterion appear to weaken the effectiveness of the confusion function.
Question
The vast majority of network-based symmetric cryptographic applications make use of ________ ciphers.

A)linear
B)block
C)permutation
D)stream
Question
A __________ cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.

A)bit
B)product
C)stream
D)block
Question
The key schedule algorithm is more popular and has received more attention than S-box design.
Question
If the bit-stream generator is a key-controlled algorithm the two users only need to share the generating key and then each can produce the keystream.
Question
A sequence of plaintext elements is replaced by a __________ of that sequence which means that no elements are added,deleted or replaced in the sequence,but rather the order in which the elements appear in the sequence is changed.

A)permutation
B)diffusion
C)stream
D)substitution
Question
Confusion seeks to make the statistical relationship between the plaintext and ciphertext as complex as possible in order to thwart attempts to deduce the key.
Question
Feistel's is a practical application of a proposal by Claude Shannon to develop a product cipher that alternates confusion and ________ functions.
Question
Key sizes of __________ or less are now considered to be inadequate.

A)128 bits
B)32 bits
C)16 bits
D)64 bits
Question
The __________ criterion states that output bits j and k should change independently when any single input bit i is inverted for all i,j and k.
Question
The ________ cipher structure,which dates back over a quarter century and which,in turn,is based on Shannon's proposal of 1945,is the structure used by many significant symmetric block ciphers currently in use.
Question
Feistel proposed that we can approximate the ideal block cipher by utilizing the concept of a __________ cipher,which is the execution of two or more simple ciphers in sequence in such a way that the final result or product is cryptographically stronger than any of the component ciphers.

A)linear
B)permutation
C)differential
D)product
Question
In ___________ the statistical structure of the plaintext is dissipated into long-range statistics of the ciphertext.This is achieved by having each plaintext digit affect the value of many ciphertext digits.
Question
Two alternatives to DES are AES and _________ DES.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/27
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Block Ciphers and the Data Encryption Standard
1
All other things being equal,smaller block sizes mean greater security.
False
2
An advantage of key-dependent S-boxes is that because they are not fixed,it is impossible to analyze the S-boxes ahead of time to look for weaknesses.
True
3
Greater complexity in the subkey generation algorithm should lead to greater difficulty of cryptanalysis.
True
4
DES exhibits the classic __________ block cipher structure,which consists of a number of identical rounds of processing.

A)Feistel
B)SAC
C)Shannon
D)Rendell
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
5
A prime concern with DES has been its vulnerability to brute-force attack because of its relatively short key length.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
6
__________ is when each plaintext element or group of elements is uniquely replaced by a corresponding ciphertext element or group of elements.

A)Substitution B)Diffusion
C)Streaming
D)Permutation
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
7
A problem with the ideal block cipher using a small block size is that it is vulnerable to a statistical analysis of the plaintext.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
8
The Feistel cipher structure,based on Shannon's proposal of 1945, dates back over a quarter of a century and is the structure used by many significant symmetric block ciphers currently in use.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
9
The vast majority of network based symmetric cryptographic applications make use of stream ciphers.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
10
Fast software encryption/decryption and ease of analysis are two considerations in the design of a Feistel cipher.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
11
A __________ cipher is one that encrypts a digital data stream one bit or one byte at a time.

A)product
B)block
C)key
D)stream
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
12
One criteria for an S-box is: "If two inputs to an S-box differ in exactly one bit,the outputs must also differ in exactly one bit."
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
13
The heart of a Feistel block cipher is the function F,which relies on the use of S-boxes.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
14
The strict avalanche criterion and the bit independence criterion appear to weaken the effectiveness of the confusion function.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
15
The vast majority of network-based symmetric cryptographic applications make use of ________ ciphers.

A)linear
B)block
C)permutation
D)stream
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
16
A __________ cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext block of equal length.

A)bit
B)product
C)stream
D)block
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
17
The key schedule algorithm is more popular and has received more attention than S-box design.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
18
If the bit-stream generator is a key-controlled algorithm the two users only need to share the generating key and then each can produce the keystream.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
19
A sequence of plaintext elements is replaced by a __________ of that sequence which means that no elements are added,deleted or replaced in the sequence,but rather the order in which the elements appear in the sequence is changed.

A)permutation
B)diffusion
C)stream
D)substitution
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
20
Confusion seeks to make the statistical relationship between the plaintext and ciphertext as complex as possible in order to thwart attempts to deduce the key.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
21
Feistel's is a practical application of a proposal by Claude Shannon to develop a product cipher that alternates confusion and ________ functions.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
22
Key sizes of __________ or less are now considered to be inadequate.

A)128 bits
B)32 bits
C)16 bits
D)64 bits
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
23
The __________ criterion states that output bits j and k should change independently when any single input bit i is inverted for all i,j and k.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
24
The ________ cipher structure,which dates back over a quarter century and which,in turn,is based on Shannon's proposal of 1945,is the structure used by many significant symmetric block ciphers currently in use.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
25
Feistel proposed that we can approximate the ideal block cipher by utilizing the concept of a __________ cipher,which is the execution of two or more simple ciphers in sequence in such a way that the final result or product is cryptographically stronger than any of the component ciphers.

A)linear
B)permutation
C)differential
D)product
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
26
In ___________ the statistical structure of the plaintext is dissipated into long-range statistics of the ciphertext.This is achieved by having each plaintext digit affect the value of many ciphertext digits.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
27
Two alternatives to DES are AES and _________ DES.
Unlock Deck
Unlock for access to all 27 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 27 flashcards in this deck.