1. General
Question 54. What is a Block Cipher?
Question 55. What is an Iterated Block Cipher?
Question 56. What is a Feistel Cipher?
Question 57. What is Exhaustive Key Search?
Question 58. What is Differential Cryptanalysis?
Question 59. What is Linear Cryptanalysis?
Question 60. What is a Weak Key for a Block
Cipher?
Question 61. What are Algebraic Attacks?
Question 62. How Can Data Compression be Used
With Encryption?
Question 63. At What Point Does an Attack Become
Practical?
2. DES
Question 64. What is DES?
Question 65. Has DES been Broken?
Question 66. How Does One Use DES Securely?
Question 67. Should One Test for Weak Keys
in DES?
Question 68. Can DES be Exported from the United
States?
Question 69. What are the Alternatives to DES?
Question 70. Is DES a Group?
Question 71. What is DES with Independent Subkeys?
Question 72. What is Triple-DES?
Question 73. How does One Use Triple-DES in
CBC Mode?
Question 74. What are G-DES, DESX?
3. Other Block Ciphers
Question 75. What is RC2?
Question 76. What is RC5?
Question 77. What is IDEA?
Question 78. What is SAFER?
Question 79. What is FEAL?
Question 80. What is Skipjack?
Question 81. What is Blowfish?
4. Modes and Multiple Encryption
Question 82. What are the ECB and CBC Modes?
Question 83. What are the CFB and OFB modes?
Question 84. What are the Counter and PCBC
Modes?
Question 85. What is Multiple Encryption?
Question 86. What is a Stream Cipher?
Question 87. What is RC4?
Question 88. What is SEAL?
Question 89. What is a Linear Feedback Shift
Register?
Question 90. What are Shift Register Cascades?
Question 91. What are the Shrinking and Self-Shrinking
Generators?
Question 92. What Other Stream Ciphers Are
There?
Question 93. What is a One-time Pad?
Question 94. What is a Hash Function?
Question 95. What is a birthday attack?
Question 96. How does the length of a hash
value affect security?
Question 97. What is a compression function?
Question 98. What are pseudo-collisions?
Question 99. What are MD2, MD4 and MD5?
Question 100. What is the Secure Hash Algorithm
(SHA and SHA-1)?
Question 101. What Other Hash Functions Are
There?