PrepAway - Latest Free Exam Questions & Answers

Which of the following BEST describes a block cipher?

Which of the following BEST describes a block cipher?

PrepAway - Latest Free Exam Questions & Answers

A.
An asymmetric key algorithm that operates on a variable-length block of plaintext and transforms
it into a fixed-length block of ciphertext

B.
A symmetric key algorithm that operates on a fixed-length block of plaintext and transforms it
into a fixed-length block of ciphertext

C.
An asymmetric key algorithm that operates on a fixed-length block of plaintext and transforms it
into a fixed-length block of ciphertext

D.
A symmetric key algorithm that operates on a variable-length block of plaintext and transforms it
into a fixed-length block of ciphertext

Explanation:
A block cipher breaks the plaintext into fixed-length blocks, commonly 64-bits, and encrypts the
blocks into fixed-length blocks of ciphertext. Another characteristic of the block cipher is that, if the
same key is used, a particular plaintext block will be transformed into the same ciphertext block.
Examples of block ciphers are DES, Skipjack, IDEA, RC5 and AES. An example of a block cipher in a
symmetric key cryptosystem is the Electronic Code Book (ECB) mode of operation. In the ECB mode,
a plaintext block is transformed into a ciphertext block as shown in Figure. If the same key is used for
each transformation, then a Code Book can be compiled for each plaintext block and corresponding
ciphertext block. Answer a is incorrect since it refers to a variable-length block of plaintext being
transformed into a fixed-length block of ciphertext. Recall that this operation has some similarity to
a hash function, which takes a message of arbitrary length and converts it into a fixedlength message
digest. * Answers “An asymmetric key algorithm that operates on a variable-length block of plaintext
and transforms it into a fixed-length block of ciphertext” and “An asymmetric key algorithm that
operates on a fixed-length block of plaintext and transforms it into a fixed-length block of
ciphertext”are incorrect because they involve asymmetric key algorithms, and the block cipher is
used with symmetric key algorithms. Exhibit:

In other cryptographic modes of operation, such as Cipher Block Chaining (CBC), the result of the
encryption of the plaintext block, Pn, is fed into the encryption process of plaintext block Pn+1. Thus,
the result of the encryption of one block affects the result of the encryption of the next block in the
sequence.


Leave a Reply