ExamGecko
Question list
Search
Search

Related questions











Question 128 - 212-81 discussion

Report
Export

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

A.
Key Schedule
Answers
A.
Key Schedule
B.
Feistel Network
Answers
B.
Feistel Network
C.
SHA-2
Answers
C.
SHA-2
D.
Diffie-Helman
Answers
D.
Diffie-Helman
Suggested answer: A

Explanation:

Key Schedule

https://en.wikipedia.org/wiki/Key_schedule

In cryptography, the so-called product ciphers are a certain kind of cipher, where the (de-)ciphering of data is typically done as an iteration of rounds. The setup for each round is generally the same, except for round-specific fixed values called a round constant, and round-specific data derived from the cipher key called a round key. A key schedule is an algorithm that calculates all the round keys from the key.

Incorrect answers:

Feistel Network - (also known as Luby--Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the German-born physicist and cryptographer Horst Feistel who did pioneering research while working for IBM (USA).

SHA-2 - (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle--Damgrd structure, from a one-way compression function itself built using the Davies--Meyer structure from a specialized block cipher.

Diffie--Hellman - key exchange is a method of securely exchanging cryptographic keys over a public channel and was one of the first public-key protocols as conceived by Ralph Merkle and named after Whitfield Diffie and Martin Hellman.

asked 18/09/2024
Paul Tierney
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first