You are on page 1of 2

1.

…………………… is a rearranging the letter without altering the actual letters


2. Two classical techniques of transposition are …………. And ……………
3. By using Rail-Fence cipher encrypt the following message: ‘meet me after the party’
Using depth = 3

4. Decrypt the following message use depth = 3  mtaehay-emfrer-eettpt

5. Using Row transposition to encrypt the following plaintext: ‘attack postponed until two am
xyz’ given that key = 3421567

6. Modern symmetric key ciphers are …………….. and ………………


7. All classical encryption algorithm are use …………………. Key
8. Claude Shannon introduced an idea of (S-P) network which provides …………….. and
………….. of message
9. …………… dissipates statistical structure of plaintext over bulk of cipher text
10. ………………… makes the relationship between the statistics of the cipher text and the
value of the encrypted key hidden
11. Confusion hides the relationship between the ………… and ………… that achieved by
…………… algorithm while Diffusion hides the relation between …………. And
…………… that achieved by ……………….. algorithm
12. ……………….. is an implementation of Shannon’s S-P network
13. A symmetric block cipher consists of a sequence of …………….. , with each round
preforming ………………. And ………………. Conditioned by ……………
14. Four parameters realization the symmetric block cipher are ……………….. , …………… ,
……………. And ………………… when they increase the security of cipher ………………
15. …………… is a symmetric-key block cipher published by the NIST
16. The proposal from ……………. Is accepted as DES
17. DES is encryption algorithm use (symmetric – Asymmetric) key uses (15 – 16 – 17 ) round
of Feistel cipher each round perform (substitution – permutation – all together)
18. The DES encryption made of two ……….…… initial and final and between them ……….…
19. DES uses ….. bit plain text and ……… bit key
20. A 64-bit plain text with 56-bit key generates 48-bit from round key
generator produce ………………
21.
22. Three types of P-box are …………. , ……………….. and …………
23. At straight P-box number of inputs …………… number of output
24. At compression P-box number of inputs ………… number of output
25. At Expansion P-box number of inputs …………… number of output
26. Key1 is 48-bit so Expansion box convert 32-bit into ……… bit while S-box convert ……….
bit into ………. bit

You might also like