Deck 20: Symmetric Encryption and Message Confidentiality
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 20: Symmetric Encryption and Message Confidentiality
1
It is possible to convert any block cipher into a stream cipher by usingthe cipher feedback (CFB) mode.
True
2
"Each block of 64 plaintext bits is encoded independently using thesame key" is a description of the CBC mode of operation.
False
3
In using encryption, we need to decide what to encrypt and where theencryption gear should be located.
True
4
The National Bureau of Standards is now the National Institute ofStandards and Technology.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
One desirable property of a stream cipher is that the ciphertext be ofthe same length as the plaintext.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Stream ciphers are far more common than block ciphers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
If both sender and receiver use the same key the system is referred to asasymmetric.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
A brute-force approach involves trying every possible key until anintelligible translation of the ciphertext into plaintext is obtained.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
If the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a ________ attack is possible.
A) known-plaintext
B) chosen-plaintext
C) chosen ciphertext
D) chosen text
A) known-plaintext
B) chosen-plaintext
C) chosen ciphertext
D) chosen text
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The most widely used encryption scheme is based on the _________ adopted in 1977 by the National Bureau of Standards.
A) AES
B) 3DES
C) CES
D) DES
A) AES
B) 3DES
C) CES
D) DES
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
_________ is the original message or data that is fed into the algorithm as input.
A) Plaintext
B) Encryption algorithm
C) Decryption algorithm
D) Ciphertext
A) Plaintext
B) Encryption algorithm
C) Decryption algorithm
D) Ciphertext
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The exact substitutions and transformations performed by the algorithm depend on the ________.
A) ciphertext
B) decryption algorithm
C) secret key
D) encryption algorithm
A) ciphertext
B) decryption algorithm
C) secret key
D) encryption algorithm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The ciphertext-only attack is the easiest to defend against.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
AES uses a Feistel structure.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
"The plaintext is 64 bits in length and the key is 56 bits in length;longer plaintext amounts are processed in 64-bit blocks" is a description of the DES algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
One disadvantage of the link encryption approach is that the messagemust be decrypted each time it enters a frame switch.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The _________ is the encryption algorithm run in reverse.
A) decryption algorithm
B) ciphertext
C) plaintext
D) secret key
A) decryption algorithm
B) ciphertext
C) plaintext
D) secret key
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Key distribution can be achieved for two parties A and B by a thirdparty selecting the key and physically delivering it to A and
B.
B.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Symmetric encryption is also referred to as secret-key or single-keyencryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Plaintext is the scrambled message produced as output.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
For general-purpose stream-oriented transmission you would typically use _______ mode.
A) CTR
B) CFB
C) ECB
D) CBC
A) CTR
B) CFB
C) ECB
D) CBC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Cryptographic systems are generically classified by _________.
A) the type of operations used for transforming plaintext to ciphertext
B) the number of keys used
C) the way in which the plaintext is processed
D) all of the above
A) the type of operations used for transforming plaintext to ciphertext
B) the number of keys used
C) the way in which the plaintext is processed
D) all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
_________ is the process of attempting to discover the plaintext or key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Unlike ECB and CBC modes, ________ mode requires only the implementation of the encryption algorithm and not the decryption algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
The _______ module performs end-to-end encryption and obtains session keys on behalf of users.
A) PKM
B) RCM
C) SSM
D) CCM
A) PKM
B) RCM
C) SSM
D) CCM
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
For general-purpose block-oriented transmission you would typically use _______ mode.
A) CBC
B) CTR
C) CFB
D) OFB
A) CBC
B) CTR
C) CFB
D) OFB
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
A ________ cipher processes the input one block of elements at a time, producing an output block for each input block.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
An encryption scheme is _________ if the cost of breaking the cipher exceeds the value of the encrypted information and/or the time required to break the cipher exceeds the useful lifetime of the information.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
For stream-oriented transmission over noisy channel you would typically use _______ mode.
A) ECB
B) CTR
C) OFB
D) CBC
A) ECB
B) CTR
C) OFB
D) CBC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used.
A) three
B) five
C) seven
D) nine
A) three
B) five
C) seven
D) nine
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
A symmetric encryption scheme has five ingredients: plaintext, encryption algorithm, ciphertext, decryption algorithm and _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
Public-key encryption was developed in the late ________.
A) 1950s
B) 1970s
C) 1960s
D) 1980s
A) 1950s
B) 1970s
C) 1960s
D) 1980s
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
__________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.
A) Session key
B) Subkey
C) Key distribution technique
D) Ciphertext key
A) Session key
B) Subkey
C) Key distribution technique
D) Ciphertext key
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
The most powerful, and most common, approach to countering the threats to network security is ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
______ was designed in 1987 by Ron Rivest and is a variable key-size stream cipher with byte-oriented operations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
"The input to the encryption algorithm is the XOR of the next 64 bits of plaintext and the preceding 64 bits of ciphertext" is a description of the ________ mode of operation.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
The _________ was issued as a federal information-processing standard and is intended to replace DES and 3DES with an algorithm that is more secure and efficient.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
A ________ is a key used between entities for the purpose of distributing session keys.
A) permanent key
B) session key
C) distribution key
D) all of the above
A) permanent key
B) session key
C) distribution key
D) all of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
______ mode is typically used for a general-purpose block-oriented transmission and is useful for high-speed requirements.
A) ECB
B) OFB
C) CFB
D) CTR
A) ECB
B) OFB
C) CFB
D) CTR
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
A ________ cipher processes the input elements continuously, producing output one element at a time as it goes along.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The three most important symmetric block ciphers are: 3DES, AES, and _____.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
All encryption algorithms are based on two general principles: substitution and _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
For symmetric encryption to work the two parties to an exchange must share the same _____, which must be protected from access by others.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
With _________ encryption the encryption process is carried out at the two end systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
With ______ encryption each vulnerable communications link is equipped on both ends with an encryption device.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck