Questions
Now, it's time to check your knowledge. Select the best response to the following questions and then check your answers, found in the Assessment section at the end of the book:
- In the 1960s, IBM assembled a group of scientists to work on cryptography research. The team was led by scientist Horst _____, who was a recognized cryptographer.
a. Watson
b. Lloyd
c. Rijndael
d. Feistel
- An exclusive OR of two values, 0011 and 1011, will yield_____.
a. 1000
b. 0010
c. 0101
d. 0011
- The Feistel cipher evolved to become _____, and then later DES.
a. Watson
b. Lucifer
c. Rijndael
d. Twofish
- A symmetric encryption algorithm uses _____.
a. a hash value
b. two keys that are related
c. a single shared key
d. two keys that are not related
- AES encrypts data using three main transforms: substitute bytes, _____, and mix columns.
a. invert columns
b. exchange keysc. roll bytes
d. shift rows
- Bruce Schneier is a well-known scientist who has developed several encryption algorithms...