Midterm ISOL535.Docx 1
Midterm ISOL535.Docx 1
Selected indeterminate
Answer:
Question 3
The four separate functions of the Advanced Encryption Standard are: permutation, arithmetic
operations over a finite field, XOR with a key, and __________ .
Selected Byte
Answer: Substitution
Question 4
Affine Algorithm with k1=1 and k2= 1,2,...n will be exactly like
Selected d.
Answer: Block Cipher
Question 5
Joseph Mauborgne proposed an improvement to the Vernam cipher that uses a random key that
is as long as the message so that the key does not need to be repeated. The key is used to encrypt
and decrypt a single message and then is discarded. Each new message requires a new key of the
same length as the new message. This scheme is known as a(n) __________ .
Selected c.
Answer: one-time pad
Question 6
The inverse add round key transformation is identical to the forward add round key
transformation because the XOR operation is its own inverse.
Selected Tru
Answer: e
Question 7
The _________ and _________ block cipher modes of operation are used for authentication.
Selected CBC, CFB
Answer:
Question 8
The input to the encryption algorithm is the XOR of the next 64 bits of plaintext and the preceding 64 bits
of ciphertext is a description of __________ mode.
Selected CB
Answer: C
Question 9
P t = "to be or not to be" and the Algorithm is Message revierse , Then P t =
Selected c.
Answer: EBOTTONROEBOT
Question 10
One of the basic techniques of number theory is the __________ algorithm which is a simple
procedure for determining the greatest common divisor of two polynomials.
Selected Euclide
Answer: an
Question 11
The S-box for AES is based on applying the following Affine transformation (over
GF(2) ):
Selected b.
Answer:
Question 12
Diffusion is :
Selected d.
Answer: “The statistical structure of the Plaintext is spread (dissipated) into long-range statistics
of the Ciphertext.”
Question 13
Plsintext ="TOBEORNOTTOBE", use 'Zig-Zag' and key =123, then Ciphertext is
Selected a.
Answer: "TBOOTOEOEROTB"
Question 14
Two integers are __________ if their only common positive integer factor is 1.
Selected relatively prime
Answer:
Question 15
A __________ is a symmetric encryption algorithm in which ciphertext output is produced bit-by-bit
or byte-by-byte from a stream of plaintext input.
Selected Stream
Answer: Cipher
Question 16
Solve x + 12=3 ( mod5 ).
Selected X = -9
Answer:
Question 17
x 15 (mod 8) and x 11 (mod 3) , Solution x 23 (mod 24)
In the AES structure both encryption and decryption ciphers begin with a(n) __________
stage, followed by nine rounds that each include all four stages, followed by a tenth round
of three stages.
Selected AddRoundKey
Answer:
Question 22
It is important to note that the Repetition Count Test described in Section 8.6 is not a
very powerful health test. It is able to detect only catastrophic failures of an entropy
source. For example, a noise source evaluated at 8 bits of min-entropy per sample
has a cutoff value of 5 repetitions to ensure a false-positive rate of approximately
once per four billion samples generated. If that noise source somehow failed to the
point that it was providing only 6 bits of min-entropy per sample, how many samples
would be expected to be needed before the Repetition Count Test would notice the
problem?
Selected 4
Answer:
Question 23
Operating systems typically provide a built-in mechanism for generating random numbers. For
example, __________ uses mouse and keyboard activity, disk I/O operations, and specific
interrupts.
Selected linu
Answer: x
Question 24
A prime concern with DES has been its vulnerability to brute-force attack because of its relatively
short key length.
Selected Tru
Answer: e
Question 28
Symmetric encryption is a form of cryptosystem in which encryption and decryption are performed
using different keys. It is also known as non-conventional encryption.
Selected Fals
Answer: e
Question 29
The plaintext of a sector or data unit is organized in to blocks of 128 bits. For encryption
and decryption, each block is treated independently. The only exception occurs when the
last block has less than 128 bits. In that case the last two blocks are
encrypted/decrypted using a ___________ technique instead of padding.
Selected Count
Answer: er
Question 30
A more important class of finite fields, for cryptography, comprises those with 2n elements depicted as
fields of the form GF(2n).
Selected Tru
Answer: e
Question 31
Solve the following system
x 19 (mod 5)
x 17 (mod 6)
x 23 (mod 9)
x 7 (mod 7)
x 11 (mod 31)
x 23 (mod 1)
x 12 (mod 19)
Selected X=4
Answer: X=5
X=5
X=0
X=11
X=0
X=12
Question 32
Mister and Adams proposed that all linear combinations of S-box columns should be
_________ which are a special class of Boolean functions that are highly nonlinear
according to certain mathematical criteria.
Selected bent functions
Answer:
Question 33
A __________ is used to produce a pseudorandom string of bits of some fixed length.
Selected e.
Answer: PRF
Question 34
When the PT-109 American patrol boat, under the command of Lieutenant John F.
Kennedy, was sunk by a Japanese destroyer, a message was received at an Australian
wireless station in Playfair code:
The key used was royal new zealand navy. Decrypt the message. Translate TT into tt.
Selected c.
Answers: PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT STRAIT TWO MILES SW
MERESU COVE X CREW OF TWELVE X REQUEST ANY INFORMATION
Question 35
The output of the encryption function is fed back to the shift register in Output Feedback mode,
whereas in _____________ the ciphertext unit is fed back to the shifter register.
An example of a finite field is the set Zp consisting of all the integers {0, 1, . . . , p - 1},
where p is a __________ and in which arithmetic is carried out modulo p.
Selected Prime
Answer: Number
Question 37
Question 38
The distribution of bits in a random number sequence should be ___________ , therefore the
frequency of occurrence of ones and zeros should be approximately equal.
Selected uniform
Answer:
Question 39
The simplest transposition cipher is the _________ technique, in which the plaintext is
written down as a sequence of diagonals and then read off as a sequence of rows.
Selected Rail-
Answer: Fence
Question 45
Affine Algorithm with Ciphertext of “UIFBGGJOFDJQIFSBMHPSJUIN ” and keys of 1 and 1 will gives
the Plaintext of
Selected d.
Answer: The Affine cipher
algorithm
Question 46
is an open source project for creating truly random numbers using inexpensive cameras, open
source code, and inexpensive hardware.
Selected d.
Answer: LavaRnd
Question 47
The _________ class [x + 1] consists of all polynomials a(x) that satisfy the
quality a(x) mod m(x) = x + 1.
Selected residu
Answer: e
Question 48
Two integers a and b are said to be congruent modulo n, if (a mod n) = (b mod n).
Selected Tru
Answer: e
Question 50
Two specific authentication services defined in X.800 are peer entity authentication and _________
authentication.
Selected Data
Answer: Origin
Question 51
The Ciphertext is “ UJQHLGYJSHZQ AK LZW KUAWFUW”. The algorithm is Direct Standard
Algorithm and key is 943220 the Plaintext is text is
Selected d.
Answer: cryptography is the science
Question 52
Both __________ produce output that is independent of both the plaintext and the
ciphertext. This makes them natural candidates for stream ciphers that encrypt plaintext
by XOR one full block at a time .
Selected OFB and CTR
Answer:
Question 54
An integer p >1 is a _________ number if and only if its only divisors are + 1 and + p
Selected prime
Answer:
Question 55
The AES key expansion algorithm takes as input a four-word (16-byte) key and produces a linear array
of __________ words (176 bytes).
Selected 4
Answer: 4
Question 56
All the techniques for providing security have two components: a security-related
transformation on the information to be sent and some secret information shared by
the two principals
Selected Tru
Answer: e
Question 57
The true random number generator may simply involve conversion of an analog source to a binary
output.
Selected Tru
Answer: e
Question 58
The __________ standard describes a method of encryption for data stored in sector-based
devices where the threat model includes possible access to stored data by the adversary.
Some characteristics of this standard include: the ciphertext is freely available for an
attacker, the data layout is not changed on the storage medium and in transit, and the
same plaintext is encrypted to different ciphertexts at different locations.
Selected IEE
Answer: E
Question 59
Feistel proposed that we can approximate the ideal block cipher by utilizing the concept
of a __________ cipher, which is the execution of two or more simple ciphers in sequence in
such a way that the final result or product is cryptographically stronger than any of the
component ciphers.
Selected product
Answer:
Question 60
Five modes of operation have been standardized by NIST for use with symmetric block ciphers such as DES
and AES: electronic codebook mode, cipher block chaining mode, cipher feedback mode, __________, and
counter mode.
Selected output
Answer: feedback
Question 61
Find the value of :
Selected Infinity mod 232
Answer: infinity mod 1234
infinity mod 1234
Question 64
Let S be the set of integers (positive, negative, and 0) under the usual operations of addition and
multiplication. S is an __________ domain.
Selected Integr
Answer: al
Question 65
The XTS-AES standard describes a method of decryption for data stored in sector-based devices
where the threat model includes possible access to stored data by the adversary.
Selected Tru
Answer: e
Question 66
With AES what are the major Implementation considerations?
Selected Selecting the mode of the cipher. Electronic Code Block is the simplest 128 bit that performs
Answer: ideally the same encryption to the identical blocks making it vulnerable. ECB should be used
with counters to avoid this issue. Cipher block chaining is the most used random initialization
vector technique that doesn't jeopardize the process.
Question 67
Selected Congruenc
Answer: es
Question 68
A __________ takes as input a source that is effectively random
Selected h.
Answer: TRNG
Question 69
Another important mode, XTS-AES, has been standardized by the __________ Security in Storage
Working Group.
Selected IEEE
Answer:
Question 70
If the PRF does not generate effectively random 128-bit output values it may be possible for an
adversary to narrow the possibilities and successfully use a brute force attack.
Selected Tru
Answer: e
Question 71
An encryption scheme is __________ secure if the ciphertext generated by the scheme does
not contain enough information to determine uniquely the corresponding plaintext, no
matter how much ciphertext is available.
Selected Unconditiona
Answer: lly
Question 72
Division requires that each nonzero element have a(n) __________ inverse.
Selected multiplicative
Answer:
Question 75
Random numbers play an important role in the use of encryption for various network security
applications.
Selected Tru
Answer: e
Question 76
Affine Algorithm with Ciphertext of “VZQEQEVZAVQGARONIOOJUONY” will gives the Plaintext of
“this is the time for good work” when the keys are:
Selected c.
Answer: 17 and 10
Question 77
Various methods of modifying a bit stream to reduce or eliminate a bias have been developed. These
are referred to as ___________ algorithms.
Selected deskewing
Answer:
Question 78
The decryption
of “SIZUZAFSIDCSIZRZHBDMWPVGZMGDPZWDASIZGUNLASZ ESNAWSIZPZTDAWLPSDCLAWSI
ZPILCSQZSBZZANWONTZASUZSSZMPLASIZRZHBDMW” is "the length of the keyword
superposed on the Plaintext, and the second is to find the shift between adjacent letters in the
keyword" using Affine with keys:
Selected a.
Answer: 3 13
Question 79