Cryptology
Cryptology
a) Integers
b) Prime numbers
c) Negative numbers
d) fractions
The principle of ___________ensures that only the sender and the intended recipients have access to the
contents of a message.
a) confidentiality
b) authentication
c) integrity
d) access control
principle of ___________ensures that the sender of a message cannot later claim that the message was never
sent.
a) access control
b) authentication
c) availability
d) non-repudiation
A_______ replicates itself by creating its own copies, in order to bring the network to a halt
a) virus
b) worm
c) Trojan horse
d) bomb
a) CFB
b) OFB
c) CCB
d) CBC
a) 32
b) 56
c) 64
d) 12
a) 8
b) 10
c) 14
d) 16
When two different message digests have the same value, it is called as ..............
a) attack
b) collision
c) hash
d) none of the above
If the sender encrypts the message with her private key, it achieves the purpose of ---------------
a) confidentiality
b) confidentiality and authentication
c) confidentiality but not authentication
d) authentication
a) 2
b) 3
c) 4
d) 5
a) encryption
b) decryption
c) cryptography
d) cryptanalyst
a) 2
4
b) 4
c) 6
d) 8
For two prime number p and q, value of φ(p*q) (Euler’s totient function) is
a) (p-1)*(q-1)
b) p*(q-1)
c) (p-1)*q
d) None of these
What is the correct Big-O notation for the time component of Shor's Factoring?
a) O((log n)3)
b) O((log n3)
c) O((log n)2)
d) O((log n)
If A and B want to communicate securely with each other, B must not know
A_______ replicates itself by creating its own copies, in order to bring the network to a halt.
a) virus
b) worm
c) trojan horse
d) bomb
a) 5
b) 2
c) 3
d) 1
a) 5
5
b) 6
c) 4
d) 2
a) DES
b) IDEA
c) MD5
d) RSA
a) message digest
b) decryption algorithm
c) digital envelop
d) none of the above
The process of writing the text as diagonals and reading it as sequence of rows is
called as
a) Rail Fence Technique
b) Caesar Cipher
c) Mono-alphabetic Cipher
d) Homophonic Substitution Cipher
Which two principles of quantum mechanics on which quantum cryptography are dependent?
a) Bits
b) Qubits
c) Bytes
d) Qubytes
When the information is between 0 and 1 in a quantum computer, what do we call this?*
a) Superposition
b) Same position
6
c) Ordinary position
d) Different position
a) (p)/(q)
b) (p)(q)
c) (p-1)(q-1)
d) (p+1)(q+1)
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Compression
Which type of encryption uses the same key for both encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) None of the above
Which of the following is a type of attack on encryption that tries every possible key combination?
a) Substitution cipher
b) Transposition cipher
c) Vigenere cipher
d) RSA cipher
a) Playfair cipher
b) Vernam cipher
c) Rail fence cipher
d) AES
a) Masquerade
b) Modification of message
c) Denial of service
d) Traffic analysis
Which of the following options correctly defines the Brute force attack?
a) Brutally forcing the user to share the useful information like pins and passwords.
7
- a) Fixed size
- c) Integration
- *b) Variable*
3. *In cryptography, the input bits are rotated to right or left in*
- a) Rotation cipher
- c) Alternate cipher
- b) XOR cipher
4. *With symmetric key algorithms, the key is used for the encryption and decryption of 1 data.*
- a) Different
- *b) Same*
- c) Both A and B
5. *In the case of symmetric key encryption, the secret key that both the parties possess can 1 be anything such
as a*
- c) Network set
- b) Developed code
- c) 2048 bits
- b) 1024 bits
8
7. *All the below-stated processes are performed in the AES (Advanced Encryption 1 Standard) Algorithm. Which
of the following process(s) are not performed in the final round of the AES?*
- a) Substitution bytes.
- c) Mix columns
8. *How many sub-keys in the total are used by the IDEA for encrypting the plain text into 1 ciphertext?*
- a) 64 sub-keys
- c) 52 sub-keys
- *b) 48 sub-keys*
9. *Which of the following properties are the characteristic properties of a block cipher 1 technique which differs
from stream cipher?*
- a) Avalanche effect
- b) Completeness.
10. *Encryption algorithms are divided into two categories based on the*
- a) Output type
- c) Process type
- b) Input type