-
Follow
- What is a monoalphabetic cipher ?
- How large is the key space of the monoalphabetic cipher applied to English (just consider lower case letters) ?
- What is the main security weakness of a monoalphabetic cipher ?
- Please provide at least 4 approaches to prevent the above weakness.
-
Block ciphers process messages in blocks like an extremely large substitution, but this is very difficult to implement for a very big block size. What is Shannon's idea to realize a block cipher with big block size ?
-
The S-box of DES round operation is not invertable, but why DES can decrypt ?
-
Follow
- Please explain the OFB mode.
- In the OFB mode, we never reuse the same sequence (key+IV). If we reuse the key, then the attacker can recover message. Please describe very precisely (mathematiclly with symbols) how the attack works.
-
Please compare the CFB mode the OFB mode by providing a table indicating at least 5 of their advantage and corresponding disadvantage.
-
This question is about issues of random access of encryption and decryption. Define notations or symbols you need before providing your answer. Please describe how to use CFB mode and CTR mode to randomly encrypt and decrypt a file Why OFB mode is inappropriate to randomly encrypt and decrypt a file?
-
Describe the details (as much as you remember) of AES operation and describe how efficiently implement AES on an 8-bit CPU ?
-
How avalanche happens in AES within the first tow rounds ?
Created
April 22, 2015 03:37
-
-
Save morris821028/702e07fa3910d402de4f to your computer and use it in GitHub Desktop.
Information Security : exam 1
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment