Secure hash algorithm developed by a NIST b IEEE cANSI d None of the above 2

Secure hash algorithm developed by a nist b ieee

This preview shows page 30 - 33 out of 33 pages.

1. Secure hash algorithm developed by_____________ [ ] a) NIST b) IEEE c)ANSI d) None of the above 2. Hash function is used to produce: [ ] 3. The input block length in DES is: [ ] 4. TDES means: [ ] 5.Which of the following is not a block cipher operating mode? [ ] (a) ECB (b) CBF (c) CBC (d) None of the above 6. Define confusion and diffusion 7. What are the essential ingredients of a symmetric cipher? 8. Define Brute-force attack 9. Define Block cipher and stream cipher 10. What are the strengths of DES? 1.Explain the single round operation of DES algorithm in detail. 2.With a neat sketch explain Blowfish algorithm 3.Explain the Fiestel cipher structure with a neat sketch. And also explain its importance
Background image
4.Explain various cipher modes of operation in detail. 5.Justify the statement that the strength of DES algorithm depends on key and nonlinear S-box design. 6.Explain encryption and decryption process in TDES 7.What is Hash function? Explain different applications of cryptographic hash functions. 8. Explain the process involved in message digest generation and processing of single block in SHA-512 B. Question testing the ability of students in applying the concepts. I) Multiple Choice Question 1.Identify false statement regarding characteristics of DES [ ] 2.Disadvantages of CFB is_______ [ ] a)if data to be operated on bit or byte oriented level then only stream mode is useful b)single error leads to errors in several blocks after the error c)each round must wait until XOR operation finishes its scheme d)all of the above 3. Encryption strength is based on: [ ] 4. Transposition cipher involves: [ ] (a) Replacement of blocks of text with other blocks (b) Replacement of characters of text with other character (c) Strict row to column replacement (d) Some permutation on the input text to produce cipher text
Background image
Information Security32 IV YEAR-I SEMESTER UNIT-II CSE
Background image
Image of page 33

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture