IEEE {Ans: 10. Another important mode, XTS-AES, has been standardized by the __________ Security in Storage Working Group.}binary curve {Ans: 1. For a ___________ defined over GF(2m), the variables and coefficients all take on values in GF(2m) and in calculations are performed over GF(2m).}encryption {Ans: 2. A common technique for masking contents of messages or other information traffic so that opponents cannot extract the information from the message is.}Harder {Ans: 10. The greater the number of rounds, the ___ it is to perform cryptanalysis.}Elliptic curve cryptography(ECC) {Ans: 6. __ makes use of elliptic curves in which the variables and coefficients are all restricted to elements of a finite field.}session key {Ans: 1. A secret key for symmetric encryption that is generated for use for a short period of time is called a ________}TRNG {Ans: 10. A __________ uses a nondeterministic source to produce randomness.}32 bits {Ans: 7. Key sizes of __________ or less are now considered to be inadequate}Seed {Ans: 2. A pseudorandom number generator takes as input a fixed value called the __________ and produces a sequence of output bits using a deterministic algorithm.}Finite {Ans: 7. For cryptography the