adplus-dvertising
frame-decoration

Question

Which of the following statements are true?

i) In the CBC mode, the plaintext block is XORed with previous ciphertext block before encryption.
ii) The CTR mode does not require an Initialization Vector
iii) The last block in the CBC mode uses an Initialization Vector
iv) In CBC mode repetitions in plaintext do not show up in ciphertext

a.

iii)

b.

ii) and iv)

c.

All the Statements are true

d.

i) ii) and iv)

Answer: (d).i) ii) and iv)

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the following statements are true? i) In the CBC mode, the plaintext block is XORed with previous ciphertext block before encryption. ii) The CTR mode does not require...

Similar Questions

Discover Related MCQs

Q. The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes.

Q. Which of the following statements are true with respect to the blowfish algorithm?

i) Provided key is large enough, brute-force key search is not practical, especially given the high key schedule cost
ii) Key dependent S-boxes and sub keys make analysis very difficult
iii) Changing both halves in each round increases security
iv) Blowfish has improved avalanche effects

Q. The last two blocks of the XTS-AES mode are

Q. How many keys are used in the ANSI X9.17 PRNG?

Q. Maurer’s Universal Statistical Test is

Q. On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text

Q. Consider the cipher text message:

YJIHX RVHKK KSKHK IQQEV IFLRK QUZVA EVFYZ RVFBX UKGBP KYVVB QTAJK TGBQO ISGHU CWIKX QUXIH DUGIU LMWKG CHXJV WEKIH HEHGR EXXSF DMIIL UPSLW UPSLW AJKTR WTOWP IVXBW NPTGW EKBYU SBQWS

Relative Frequencies
3 7 2 2 5 5 7 9 11 4 14 4 2 1 3 4 6 5 6 5 7 10 9 8 4 2

The Index of Coincidence is

Q. The plain text for the cipher text RRLMWBKASPDH. Given the encryption key
[(17 17 5 | 21 18 21 | 2 2 19)] is –

Q. The Inverse S-box value for byte stored in cell (D,2)

Q. Division of (131B6C3) base 16 by (lA2F) base 16 yeilds

Q. In AES, to make the s-box, we apply the transformation –

b’i = bi XOR b(i+4) XOR b(i+5) XOR b(i+6) XOR b(i+7) XOR ci
What is ci in this transformation?

Q. The inverse s-box permutation follows -

b’i = b(i+2) XOR b(i+5) XOR b(i+7) XOR di
Here di is –

Q. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ______________

Q. Using Differential Crypt-analysis, the minimum computations required to decipher the DES algorithm is-

Q. Using SDES, the Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is,

Q. A substitution cipher substitutes one symbol with

Q. An asymmetric-key (or public-key) cipher uses

Q. A straight permutation cipher or a straight P-box has the same number of inputs as

Q. We use Cryptography term to transforming messages to make them secure and immune to

Q. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not