2.5 what are the two general approaches to attacking a cipher? 2.6 why do some block cipher modes of operation only use encryption while others use both encryption and decryption? 2.7 what is triple encryption? 2.8 why is the middle portion of 3des a decryption rather than an encryption?