Professional Documents
Culture Documents
Lecture 7:
1. A block cipher is a deterministic algorithm operating on fixed-length
groups of bits, called
a. Streams b. Blocks c. Cryptography d. Bits
2. must be provided to both users in advance via some
independent and secure channel
a. Keystream b. Plain text c. Cipher text d. Stream
3. Shannon’s concern was to thwart cryptanalysis based on
a. Cryptanalysis b. Statistical analysis c. Cryptography d.Blocks
4. A is a permutation of all the bits.
a. Combination box b. Substitution box c. Permutation box
d. Stream ciphers
5. A substitutes a small block of input bits with another
block of output bits.
a. Permutation box b. Combination box c. Substitution box
d. Encryption
Lecture 8:
4. A is an attack model for cryptanalysis
a. Fault based attack b. Brute force attack
c. Chosen-cipher text attack c. None of the above
5. attack on the running time of the decryption
algorithm
a. Brute force attack b. Fault based attack c. Timing attack
d. None of the above
Answers