adplus-dvertising
frame-decoration

Question

The XTS-AES mode was approved by NIST in

a.

1999

b.

2010

c.

2006

d.

2002

Answer: (b).2010

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The XTS-AES mode was approved by NIST in

Similar Questions

Discover Related MCQs

Q. Which of the following is a natural candidates for stream ciphers?

Q. Which of the following modes of operation does not involve feedback?

Q. Which mode requires the implementation of only the encryption algorithm?

Q. Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?

Q. Which mode of operation has the worst “error propagation” among the following?

Q. The counter value in CTR modes repeats are a regular interval.

Q. Which of the following modes does not implement chaining or “dependency on previous stage computations”?

Q. In OFB Transmission errors do not propagate: only the current ciphertext is affected, since keys are generated “locally”.

Q. Which of the following can be classified under advantages and disadvantages of OFB mode?

i) Transmission errors
ii) A bit error in a ciphertext segment
iii) Cannot recover from lost ciphertext segments
iv) Ciphertext or segment loss

Q. There is a dependency on the previous ‘s’ bits in every stage in CFB mode. Here ‘s’ can range from ___

Q. Which of the following statements are true ?

i) In the CBC mode, the plaintext block is XORed with previous ciphertext block before encryption
ii) The CTR mode does not require an Initialization Vector
iii) The last block in the CBC mode uses an Initialization Vector
iv) In CBC mode repetitions in plaintext do not show up in ciphertext

Q. Which of the following is false for ECB mode of operation?

i) The Plain text is broken into blocks of size 128 bytes
ii) Blocks can be swapped, repeated, replaced without recipient noticing
iii) Good for short data
iv) Encryption of each block is done separately using a randomly generated key for each block

Q. Which one of the following modes of operation in DES is used for operating short data?

Q. How many modes of operation are there in in DES and AES?

Q. How many round keys are generated in the AES algorithm?

Q. Which of the following are true ?

i) In the AES key expansion algorithm, the function g() operates on w i+3
ii) Perform a one-byte right circular rotation on the argument 4-byte word
iii) The round constant follows the formula RC[j] = RC[j − 1]

Q. The inverse transformation matrix times the forward transformation matrix equals the identity matrix.

Q. For a key 25D5 and PT input A479 what is the output we obtain after the “add round key” function?

Q. How many step function do Round 1 and 2 each have in S-AES?

Q. Which of the following is a faulty S-AES step function?