0% found this document useful (0 votes)
15 views8 pages

Cryptology

Uploaded by

equram6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views8 pages

Cryptology

Uploaded by

equram6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

1

_________are very crucial for the success of asymmetric key cryptography.

a) Integers
b) Prime numbers
c) Negative numbers
d) fractions

The value of φ(14) (Euler’s totient function) is


a) 2
b) 4
c) 8
d) 6

The value of φ(21) (Euler’s totient function) is


a) 10
b) 12
c) 14
d) 16

For a prime number p, value of φ(p) (Euler’s totient function) is


a) p
b) p-1
c) p+1
d) none of these

If a computer system is not accessible, the principle of _____________


a) confidentiality
b) authentication
c) access control
d) availability

In ------------attacks, the message content are modified*


a) passive
b) active
c) both of these
d) none of these

The principle of ___________ensures that only the sender and the intended recipients have access to the

contents of a message.
a) confidentiality
b) authentication
c) integrity
d) access control

principle of ___________ensures that the sender of a message cannot later claim that the message was never

sent.
a) access control
b) authentication
c) availability
d) non-repudiation

Symmetric key cryptography is _______ asymmetric key cryptography.


a) always slower than
b) of the same speed as
c) faster than
d) usually slower than
2

In _____________ attacks, the message contents are not modified.


a) passive
b) active
c) both of the above
d) none of the above

DOS attacks are caused by ______________


a) authentication
b) modification
c) fabrication
d) interruption

Virus in a computer is a -----------


a) file
b) program
c) database
d) application software

A_______ replicates itself by creating its own copies, in order to bring the network to a halt
a) virus
b) worm
c) Trojan horse
d) bomb

The language that we commonly use can be termed as ...............


a) pure text
b) simple text
c) plain text
d) normal text

______________ works on block mode.

a) CFB
b) OFB
c) CCB
d) CBC

The codified language can be termed as---------


a) clear text
b) unclear text
c) code text
d) cipher text

In substitution cipher, the following happens.


a) characters are replaced by other characters
b) rows are replaced by columns
c) columns are replaced by rows
d) none of the above

Caesar Cipher is an example of


a) Substitution Cipher
b) Transposition Cipher
c) Substitution as well as Transposition Cipher
d) none of the above

Vernam Cipher is an example of


a) Substitution Cipher
b) Transposition Cipher
c) Substitution as well as Transposition Cipher
d) none of the above
3

_________ increases the redundancy of plain text.


a) Confusion
b) Diffusion
c) Both confusion and diffusion
d) Neither confusion nor diffusion

DES encrypts blocks of ________ bits.

a) 32
b) 56
c) 64
d) 12

There are _________ rounds in DES.

a) 8
b) 10
c) 14
d) 16

When two different message digests have the same value, it is called as ..............

a) attack
b) collision
c) hash
d) none of the above

If the sender encrypts the message with her private key, it achieves the purpose of ---------------

a) confidentiality
b) confidentiality and authentication
c) confidentiality but not authentication
d) authentication

In asymmetric key cryptography,_______ keys are required per communicating

a) 2
b) 3
c) 4
d) 5

Conversion of plain text into cipher text is called as


a) encryption
b) decryption
c) cryptography
d) cryptanalyst

Conversion of cipher text into plain text is called as

a) encryption
b) decryption
c) cryptography
d) cryptanalyst

The value of φ(10) (Euler’s totient function) is

a) 2
4

b) 4
c) 6
d) 8

For two prime number p and q, value of φ(p*q) (Euler’s totient function) is

a) (p-1)*(q-1)
b) p*(q-1)
c) (p-1)*q
d) None of these

What is the correct Big-O notation for the time component of Shor's Factoring?

a) O((log n)3)
b) O((log n3)
c) O((log n)2)
d) O((log n)

If A and B want to communicate securely with each other, B must not know

a) A’s private key


b) A’s public key
c) B’s public key
d) B’s private key

A_______ replicates itself by creating its own copies, in order to bring the network to a halt.

a) virus
b) worm
c) trojan horse
d) bomb

Transposition cipher involves

a) replacement of blocks of text with


b) replacement of characters of text with other characters
c) strictly row-to-column replacement
d) some permutation on the input text to produce ciphertext

Diffe-Helman key exchange algorithm can fall pray to the ............

a) meet in the middle attack


b) man in the middle attack
c) both of the above
d) none of the above

In Diffe-Helman key exchange algorithm if n=11, g=7, x=3 then A=?

a) 5
b) 2
c) 3
d) 1

In Diffe-Helman key exchange algorithm if n=11, g=7, x=3 then A=?

a) 5
5

b) 6
c) 4
d) 2

To decrypt a message encrypted using RSA, we need the

a) sender's private key


b) sender's public key
c) receiver's private key
d) receiver's public key

--------------------- is a message digest algorithm.

a) DES
b) IDEA
c) MD5
d) RSA

A --------------- is used to verify the integrity of a message

a) message digest
b) decryption algorithm
c) digital envelop
d) none of the above

RSA --------------------- be used for digital signature


a) must not
b) can not
c) can
d) should not

The process of writing the text as diagonals and reading it as sequence of rows is

called as
a) Rail Fence Technique
b) Caesar Cipher
c) Mono-alphabetic Cipher
d) Homophonic Substitution Cipher

Which two principles of quantum mechanics on which quantum cryptography are dependent?

a) Heisenberg Uncertainty Principle and Photon Polarization Principle.


b) Fundamental Principle and Bohr's Model Principle
c) Momentum Principle and Photons Principle
d) Planck's Principle and Fundamental Principle

What do we call the pieces of information in a quantum computer?

a) Bits
b) Qubits
c) Bytes
d) Qubytes

When the information is between 0 and 1 in a quantum computer, what do we call this?*

a) Superposition
b) Same position
6

c) Ordinary position
d) Different position

In RSA, Ф(n) = _______ in terms of p and q.

a) (p)/(q)
b) (p)(q)
c) (p-1)(q-1)
d) (p+1)(q+1)

Which of the following is not a type of encryption?

a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Compression

Which type of encryption uses the same key for both encryption and decryption?

a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) None of the above

Which of the following is a type of attack on encryption that tries every possible key combination?

a) Brute force attack


b) Dictionary attack
c) Collision attack
d) Rainbow table attack

Which of the following is not a type of cipher?

a) Substitution cipher
b) Transposition cipher
c) Vigenere cipher
d) RSA cipher

Which of the following is a type of block cipher?

a) Playfair cipher
b) Vernam cipher
c) Rail fence cipher
d) AES

Which of the following attacks is a passive attack?

a) Masquerade
b) Modification of message
c) Denial of service
d) Traffic analysis

Which of the following options correctly defines the Brute force attack?

a) Brutally forcing the user to share the useful information like pins and passwords.
7

b) Trying every possible key to decrypt the message.


c) One entity pretends to be some other entity
d) The message or information is modified before sending it to the receiver

1. *Which of the following ciphers uses asymmetric key cryptography?*

- a) Rail Fence Cipher

- b) Data Encryption Standard (DES)

- *c) Diffie Hellman Cipher*

- d) None of the above

2. *Block ciphers accumulate symbols in a message of a*

- a) Fixed size

- c) Integration

- *b) Variable*

- d) All of the mentioned above

3. *In cryptography, the input bits are rotated to right or left in*

- a) Rotation cipher

- c) Alternate cipher

- *d) Shift cipher*

- b) XOR cipher

4. *With symmetric key algorithms, the key is used for the encryption and decryption of 1 data.*

- a) Different

- *b) Same*

- c) Both A and B

- d) None of the mentioned above

5. *In the case of symmetric key encryption, the secret key that both the parties possess can 1 be anything such
as a*

- *a) Passcode or a password*

- c) Network set

- b) Developed code

- d) None of the mentioned above

6. *What is the block size of plain text in SHA-512 algorithm?*

- *a) 512 bits*

- c) 2048 bits

- b) 1024 bits
8

- d) None of the above

7. *All the below-stated processes are performed in the AES (Advanced Encryption 1 Standard) Algorithm. Which
of the following process(s) are not performed in the final round of the AES?*

- a) Substitution bytes.

- *b) Shift rows*

- c) Mix columns

- d) Add round key

8. *How many sub-keys in the total are used by the IDEA for encrypting the plain text into 1 ciphertext?*

- a) 64 sub-keys

- c) 52 sub-keys

- *b) 48 sub-keys*

- d) Only one key and no subkeys

9. *Which of the following properties are the characteristic properties of a block cipher 1 technique which differs
from stream cipher?*

- a) Avalanche effect

- *c) Both a, and b.*

- b) Completeness.

- d) None of the above.

10. *Encryption algorithms are divided into two categories based on the*

- a) Output type

- c) Process type

- b) Input type

- *d) All of the mentioned above*

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy