Question
a.
Cipher Feedback Mode (CFB)
b.
Cipher Block chaining (CBC)
c.
Electronic code book (ECB)
d.
Output Feedback Modes (OFB)
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which one of the following modes of operation in DES is used for operating short data?
Similar Questions
Discover Related MCQs
Q. Which of the following is false for ECB mode of operation?
i) The Plain text is broken into blocks of size 128 bytes
ii) Blocks can be swapped, repeated, replaced without recipient noticing
iii) Good for short data
iv) Encryption of each block is done separately using a randomly generated key for each block
View solution
Q. Which of the following statements are true ?
i) In the CBC mode, the plaintext block is XORed with previous ciphertext block before encryption
ii) The CTR mode does not require an Initialization Vector
iii) The last block in the CBC mode uses an Initialization Vector
iv) In CBC mode repetitions in plaintext do not show up in ciphertext
View solution
Q. There is a dependency on the previous ‘s’ bits in every stage in CFB mode. Here ‘s’ can range from ___
View solution
Q. Which of the following can be classified under advantages and disadvantages of OFB mode?
i) Transmission errors
ii) A bit error in a ciphertext segment
iii) Cannot recover from lost ciphertext segments
iv) Ciphertext or segment loss
View solution
Q. In OFB Transmission errors do not propagate: only the current ciphertext is affected, since keys are generated “locally”.
View solution
Q. Which of the following modes does not implement chaining or “dependency on previous stage computations”?
View solution
Q. The counter value in CTR modes repeats are a regular interval.
View solution
Q. Which mode of operation has the worst “error propagation” among the following?
View solution
Q. Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?
View solution
Q. Which mode requires the implementation of only the encryption algorithm?
View solution
Q. Which of the following modes of operation does not involve feedback?
View solution
Q. Which of the following is a natural candidates for stream ciphers?
View solution
Q. The XTS-AES mode was approved by NIST in
View solution
Q. The XTS-AES mode is based on the concept of tweakable block cipher.
View solution
Q. The purpose of a ‘tweak’ in XTS-AES mode is to
View solution
Q. A tweak is used in XTS-AES mode to provide a different output for the same input PT and same key.
View solution
Q. XTS-AES mode of operation is a better version of
View solution
Q. What is the size of the XTS-AES key?
View solution
Q. Which of the following represent the tweak?
View solution
Q. Which of the following is true for the tweak in XTS-AES mode?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!