CS512 - CH03 Testbank Crypto6e
CS512 - CH03 Testbank Crypto6e
CS512 - CH03 Testbank Crypto6e
Stallings
TRUE OR FALSE
T F 5. A problem with the ideal block cipher using a small block size is
that it is vulnerable to a statistical analysis of the plaintext.
T F 7. All other things being equal, smaller block sizes mean greater
security.
T F 10. A prime concern with DES has been its vulnerability to brute-force
attack because of its relatively short key length.
T F 11. One criteria for an S-box is: "If two inputs to an S-box differ in
exactly one bit, the outputs must also differ in exactly one bit.”
T F 12. The heart of a Feistel block cipher is the function F, which relies
on the use of S-boxes.
T F 13. The strict avalanche criterion and the bit independence criterion
appear to weaken the effectiveness of the confusion function.
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
T F 15. The key schedule algorithm is more popular and has received
more attention than S-box design.
MULTIPLE CHOICE
1. DES exhibits the classic __________ block cipher structure, which consists of a
number of identical rounds of processing.
A) Feistel B) SAC
C) Shannon D) Rendell
A) permutation B) diffusion
C) stream D) substitution
3. A __________ cipher is one that encrypts a digital data stream one bit or one
byte at a time.
A) product B) block
C) key D) stream
A) linear B) block
C) permutation D) stream
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
A) bit B) product
C) stream D) block
6. __________ is when each plaintext element or group of elements is uniquely
replaced by a corresponding ciphertext element or group of elements.
A) Substitution B) Diffusion
C) Streaming D) Permutation
C) 16 bits D) 64 bits
8. Feistel proposed that we can approximate the ideal block cipher by utilizing
the concept of a __________ cipher, which is the execution of two or more
simple ciphers in sequence in such a way that the final result or product is
cryptographically stronger than any of the component ciphers.
A) linear B) permutation
C) differential D) product
9. The criteria used in the design of the __________ focused on the design of the
S-boxes and on the P function that takes the output of the S-boxes.
10. The greater the number of rounds, the __________ it is to perform cryptanalysis.
A) clarification B) alignment
C) confusion D) stability
12. One of the most intense areas of research in the field of symmetric block
ciphers is __________ design.
A) S-box B) F-box
C) E-box D) D-box
13. Mister and Adams proposed that all linear combinations of S-box columns
should be _________ which are a special class of Boolean functions that are
highly nonlinear according to certain mathematical criteria.
14. The Nyberg approach that is more or less a manual approach with only
simple mathematics to support it is __________ .
A) human-made B) random
15. Allowing for the maximum number of possible encryption mappings from the
plaintext block is referred to by Feistel as the __________ .
SHORT ANSWER
5. The avalanche criterion is defined as: "An S-box satisfies GA of order y if, for
a 1-bit input change, at least y output bits change."
7. The most widely used encryption scheme is based on the Data Encryption
Standard (DES) adopted in 1977 by the National Bureau of Standards as
Federal Information Processing Standard 46.
8. A change in one bit of the plaintext or one bit of the key should produce a
change in many bits of the ciphertext. This is referred to as the avalanche
effect.
9. Two areas of concern regarding the level of security provided by DES are the
nature of the algorithm and the key size.
10. A timing attack exploits the fact that an encryption or decryption algorithm
often takes slightly different amounts of time on different inputs.
11. The bit independence criterion states that output bits j and k should change
independently when any single input bit i is inverted for all i, j and k.
Cryptography and Network Security: Principles and Practice, 6th Edition, by William
Stallings
12. The Feistil cipher structure, which dates back over a quarter century and
which, in turn, is based on Shannon’s proposal of 1945, is the structure used
by many significant symmetric block ciphers currently in use.
13. The cryptographic strength of a Feistel cipher derives from three aspects of
the design: the function F, the key schedule algorithm, and the number of
rounds.
14. The strict avalanche criterion states that any output bit j of an S-box should
change with probability 1/2 when any single input bit i is inverted for all i,j.