Similar Collections


.

questions

Title
In affine block cipher systems if f(m)=Am + t, what is f(m1+m2) ?
In affine block cipher systems if f(m)=Am + t, what is f(m1+m2+m3) ?
What is the number of possible 3 x 3 affine cipher transformations ?
Super-Encipherment using two affine transformations results in another affine transformation
If the key is 110100001, the output of the SP network for the plaintext: 101110001 is
If the key is 110100001 where, If ki=0, then S_i (x)=((1 1 0 | 0 1 1 | 1 0 0 ))x+((1 1 1)) and If ki=1, then S_i (x)=((0 1 1 | 1 0 1 | 1 0 0))x+((0 1 1)) then the output of the SP network for the plaintext: 101110001 is
Confusion hides the relationship between the ciphertext and the plaintext
The S-Box is used to provide confusion, as it is dependent on the unknown key
Which of the following slows the cryptographic algorithm
DES follows
The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key
The DES algorithm has a key length of
In the DES algorithm, although the key size is 64 bits only 48bits are used for the encryption procedure, the rest are parity bits
In the DES algorithm the round key is __________ bit and the Round Input is ____________bits
In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________
The Initial Permutation table/matrix is of size
The number of unique substitution boxes in DES after the 48 bit XOR operation are
In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring every 4th bit
During decryption, we use the Inverse Initial Permutation (IP-1) before the IP
A preferable cryptographic algorithm should have a good avalanche effect
total questions: 38

Questions

38

Views

410

Best Answers

299

Points

5