Answer the following statements true (T) or false (F)

1. The vast majority of network based symmetric cryptographic applications make use of stream ciphers.
2. The Feistel cipher structure, based on Shannon's proposal of 1945, dates back over a quarter of a century and is the structure used by many significant symmetric block ciphers currently in use. ?
3. DES uses a 56-bit block and a 64-bit key. ?
4. If the bit-stream generator is a key-controlled algorithm the two users only need to share the generating key and then each can produce the keystream. ?
5. A problem with the ideal block cipher using a small block size is that it is vulnerable to a statistical analysis of the plaintext.


1. FALSE
2. TRUE
3. FALSE
4. TRUE
5. TRUE

Computer Science & Information Technology

You might also like to view...

A(n) ______________________________ is a strategy designed to keep valid traffic from accessing the target of your attack.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statements are true?

a. Use the private modifier to encapsulate data fields. b. Encapsulating data fields makes the program easy to maintain. c. Encapsulating data fields makes the program short. d. Encapsulating data fields helps prevent programming errors.

Computer Science & Information Technology

Why is echoing user input a good programming practice?

What will be an ideal response?

Computer Science & Information Technology

________ display in the pane on the left of the PowerPoint window

Fill in the blank(s) with correct word

Computer Science & Information Technology