Problem
1. What is the difference between a block cipher and a stream cipher?
2. What are the two general approaches to attacking a cipher?
3. Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?