Cs8792-Cryptography and Network Security Unit-3: Sn. No. Option 1 Option 2 Option 3 Option 4 Correct Option
Cs8792-Cryptography and Network Security Unit-3: Sn. No. Option 1 Option 2 Option 3 Option 4 Correct Option
UNIT- 3
Sn. Correct
Question Option 1 Option 2 Option 3 Option 4
No. Option
The man-in-the-middle attack can endanger the security of
1 Authenticated Joined Submit Separate 1
the Diffie-Hellman method if two parties are not
2 RSA is also a stream cipher like Merkel-Hellman TRUE FALSE 1
3 An Asymmetric-Key (or public-key) cipher uses 1 Key 2 Key 3 Key 4 Key 2
Rabin Cryptosystem is a variant of the Elgamal
4 TRUE FALSE 2
Cryptosystem
5 In RSA, Ф(n) = ___ in terms of p and q (p)/(q) (p)(q) (p-1)(q-1) (p+1)(q+1) 3
In Asymmetric Key Cryptography, the two key, e and d,
6 Others Data Keys Each other 4
have a special relationship to
Using Rabin cryptosystem with p=23 and q=7 ,Encrypt
7 42 93 74 12 4
P=24 to find ciphertext. The Cipher text is
For RSA to work, the value of P must be less than the
8 p q n f 3
value of
9 Session keys are transmitted after being encrypted by make-shift keys temporary keys master keys section 3
Which Cryptographic system uses C1 = (e1r) mod p and
10 1
C1 = (e2r x P) mod p at the encryption side? Elgamal RSA Rabin Whirlpool
The certificate message is required for any agreed-on key Ephemeral Diffie- Anonymous Diffie- Fixed Diffie-
11 RSA 2
exchange method except Hellman Hellmanc Hellmand.
Sender chooses p = 107, e1 = 2, d = 67, and the random
12 integer is r=45. Find the plaintext to be transmitted if the 45 76 66 13 3
ciphertext is (28,9)
In Asymmetric key Cryptography, although RSA can be
13 used to encrypt and decrypt actual messages, it is very Short Flat Thin 2
Long
slow if the message is
Which of the following is not a type of symmetric-key Data Encryption
14 Caesar cipher Diffie Hellman cipher Playfair cipher 3
cryptography technique? Standard (DES)
In Elgamal cryptosystem, given the prime p=31,Choose
15 24 36 25 62 3
e1= first primitive root of p and d=10, calculate e2
How many bytes of the secret key is generated using
16 256 871 1024 962 1
Diffie-Hellman encryption/decryption scheme?
Computation of the discrete logarithm is the basis of the Symmetric Asymmetric Diffie-Hellman key Secret key
17 3
cryptographic system ___ cryptography cryptography exchange cryptography