Suggested Questions Crypto2
Suggested Questions Crypto2
1. The principle of ................ ensures that only the sender and the intended recipient(s) have
access to the contents of a message-
a) Authentication
b) Confidentiality
c) Integrity
d) None of these
2. RSA.............. be used for Digital Signatures
a) Must not
b) cannot
c) Can
d) should not.
3. While creating an envelope, we encrypt the ..................... with the................
a) sender's private key, one time session key
b) receiver's public key, one time session key
c) one time session key, sender's private key
d) one time session key, receiver's public key.
4. DOS attacks are caused by
a) Alternation
b) authentication
c) Fabrication
d) replay attacks.
5. DES encrypts blocks of.............. bits
a) 32
b) 56
c) 64
d) 128
6. Caesar Cipher is an example of
a) Substitution Cipher
b) Transposition Cipher
c) Substitution as well as Transposition Cipher
d) None of these
7. Which one of the following algorithms is not used in asymmetric-key cryptography?
a) RSA algorithm
b) Diffie-hellman algorithm
c) electronic code book algorithm
d) none of the mentioned
8. Cryptographic hash function takes an arbitrary block of data and returns
a) fixed size bit string
b) variable size bit string
c) both (a) and (b)
d) none of the mentioned
9. In MD-5 the length of the message digest is
a) 160
b) 128
c) 64
d) 54
10. We require................. to verify digital signature.
a) sender’s private key
b) receiver’s private key
c) sender and receiver’s public key
d) all the connected devices to the network
11. In asymmetric key cryptography, the private key is kept by
a) sender
b) receiver
c) sender and receiver
d) all the connected devices to the network
12. Cryptanalysis is used
a) to find some insecurity in a cryptographic scheme
b) to increase the speed
c) to encrypt the data
d) none of the mentioned.
13. ECB stands for
(a) Electronic Control Book
(b) Electronic Code Book
(c) Electronic Cipher Book
(d) Electronic Cryptography Book
14. The number of rounds in RC5 can range from 0 to
(a) 127
(b) 63
(c) 255
(d) 31
15. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if
two parties are not
(a) Authenticated
(b) Joined
(c) Submit
(d) Separate
16. For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 and find
the cipher text.
(a) C=80
(b) C = 92
(c) C= 56
(d) C = 23
17. A cipher in which the order is not preserved
(a) Polyalphabetic substitution based
(b) Transposition-based
(c) Substitution base
(d) Public key based
18. When a hash function is used to provide message authentication, the hash function value is
referred to as
(a) Message Field
(b) Message Digest
(c) Message Score
(d) Message Leap
19. SET is a
(a) Electronic payment system
(b) Security protocol
(c) Credit card payment infrastructure
(d) Internet payment system
20. Data Authentication Algorithm (DAA) is based on
(a) DES
(b) AES
(c) MD-5
(d) SHA-1
21. Triple-DES has ______ keys.
(a) 1
(b) 2
(c) 5
(d) 4
22. A small program that changes the way a computer operates.
(a) Worm
(b) Trojan
(c) Virus
(d) Bomb