Cryptography and Network Security Principles and Practice 6th Edition William Stallings Test Bank instant download
Cryptography and Network Security Principles and Practice 6th Edition William Stallings Test Bank instant download
https://testbankfan.com/product/cryptography-and-network-
security-principles-and-practice-6th-edition-william-stallings-
test-bank/
https://testbankfan.com/product/cryptography-and-network-security-
principles-and-practice-7th-edition-stallings-test-bank/
https://testbankfan.com/product/cryptography-and-network-security-
principles-and-practice-7th-edition-stallings-solutions-manual/
https://testbankfan.com/product/computer-security-principles-and-
practice-4th-edition-stallings-test-bank/
https://testbankfan.com/product/holes-human-anatomy-physiology-13th-
edition-shier-test-bank/
Calculus 2nd Edition Briggs Test Bank
https://testbankfan.com/product/calculus-2nd-edition-briggs-test-bank/
https://testbankfan.com/product/introduction-to-java-programming-
comprehensive-version-10th-edition-liang-test-bank/
https://testbankfan.com/product/fundamentals-of-physics-extended-10th-
edition-halliday-solutions-manual/
https://testbankfan.com/product/services-marketing-6th-edition-
zeithaml-test-bank/
https://testbankfan.com/product/listen-8th-edition-kerman-test-bank/
Marketing Research Essentials Canadian 2nd Edition
McDaniel Test Bank
https://testbankfan.com/product/marketing-research-essentials-
canadian-2nd-edition-mcdaniel-test-bank/
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
TRUE OR FALSE
MULTIPLE CHOICE
2. Triple DES makes use of __________ stages of the DES algorithm, using a total of
two or three distinct keys.
A. nine B. six
C. twelve D. three
A. IEEE B. ISO
C. NIST D. ITIL
4. The _________ and _________ block cipher modes of operation are used for
authentication.
5. __________ modes of operation have been standardized by NIST for use with
symmetric block ciphers such as DES and AES.
A. Three B. Five
C. Nine D. Seven
6. The output of the encryption function is fed back to the shift register in
Output Feedback mode, whereas in ___________ the ciphertext unit is fed back
to the shift register.
7. The simplest form of multiple encryption has __________ encryption stages and
__________ keys.
8. The __________ algorithm will work against any block encryption cipher and
does not depend on any particular property of DES.
9. The __________ method is ideal for a short amount of data and is the
appropriate mode to use if you want to transmit a DES or AES key securely.
11. “Each block of plaintext is XORed with an encrypted counter. The counter is
incremented for each subsequent block", is a description of ___________ mode.
12. The __________ mode operates on full blocks of plaintext and ciphertext, as
opposed to an s-bit subset.
A. CBC B. ECB
C. OFB D. CFB
A. CBC B. CTR
C. ECB D. CFB
A. OFB B. S-AES
C. 3DES D. XTS-AES
15. Both __________ produce output that is independent of both the plaintext and
the ciphertext. This makes them natural candidates for stream ciphers that
encrypt plaintext by XOR one full block at a time.
SHORT ANSWER
2. The most significant characteristic of __________ is that if the same b-bit block
of plaintext appears more than once in the message, it always produces the
same ciphertext.
4. Five modes of operation have been standardized by NIST for use with
symmetric block ciphers such as DES and AES: electronic codebook mode,
cipher block chaining mode, cipher feedback mode, __________, and counter
mode.
6. "The input to the encryption algorithm is the XOR of the next 64 bits of
plaintext and the preceding 64 bits of ciphertext" is a description of __________
mode.
11. The _________ must be a data block that is unique to each execution of the
encryption operation and may be a counter, a timestamp, or a message
number.
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
12. A __________ cipher can operate in real time and eliminates the need to pad a
message to be an integral number of blocks.
14. The plaintext of a sector or data unit is organized in to blocks of 128 bits. For
encryption and decryption, each block is treated independently. The only
exception occurs when the last block has less than 128 bits. In that case the
last two blocks are encrypted/decrypted using a ___________ technique instead
of padding.
15. The __________ standard describes a method of encryption for data stored in
sector-based devices where the threat model includes possible access to
stored data by the adversary. Some characteristics of this standard include:
the ciphertext is freely available for an attacker, the data layout is not
changed on the storage medium and in transit, and the same plaintext is
encrypted to different ciphertexts at different locations.
Random documents with unrelated
content Scribd suggests to you:
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
testbankfan.com