Write 400–600 words that respond to the following questions:
Explain with example the practical cryptanalytic attacks on 3DES.
Is it possible to convert a block cipher into a stream cipher using cipher feedback, output feedback and
counter modes? If yes, how. If not, why not?