0% found this document useful (0 votes)
788 views3 pages

In Cryptographic Terms

This document provides information about cryptography questions and answers. It discusses topics like ciphers, encryption algorithms, hash functions, digital signatures, and cryptanalysis techniques. Specifically, it defines what a cipher is, discusses the Enigma machine, block and stream ciphers, modes of operation like ECB and CBC, hash functions like MD5, public key cryptography applications, and evaluates the security of algorithms like DES.

Uploaded by

sathish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
788 views3 pages

In Cryptographic Terms

This document provides information about cryptography questions and answers. It discusses topics like ciphers, encryption algorithms, hash functions, digital signatures, and cryptanalysis techniques. Specifically, it defines what a cipher is, discusses the Enigma machine, block and stream ciphers, modes of operation like ECB and CBC, hash functions like MD5, public key cryptography applications, and evaluates the security of algorithms like DES.

Uploaded by

sathish
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

https://www.crackyourinterview.com/SubCategory-Cryptography-Questions-Answers.

aspx

In cryptographic terms, what does cipher indicate? The algorithm used for encryption and
decryption

The cryptographic device based on rotor systems, used by the Germans during World War II is
Enigma

The cipher generated by combining multiple transformations to enhance the security of the
resultant cipher is Product ciphers

Which of the following poses challenges in the breaking of the Vigenère Cipher? Length of the Key

In which of the following cryptographic methods is the order of the units in the data rearranged to
form the ciphertext? Transpositional ciphers

Which of the following is a major disadvantage of ECB mode? Lack of diffusion

The algorithm that is considered to have electrified non-military cryptology and cryptanalysis is
Vernam Cipher

Which of the following is a characteristic of block ciphers? Key dependent S-boxes

The strategy used to ensure that the message is a multiple of the cipher block size without
compromising the size of the ciphertext is Ciphertext stealing

RC4 is a block cipher. False

Frequency analysis can be performed on polyalphabetic ciphers, which makes it weak. True

The hash function value used in message authentication is also known as Message Digest

What is the size of the hash value produced by the MD5 algorithm? 128 bits

Which among the following algorithms is designed based on the Feistel Cipher? DES

Which among the following are steps in each round of AES algorithm? Substitute Bytes

The idea behind "confusion" in cryptography is to hide the relationship between the plaintext and
ciphertext. False

The primary goal of cryptanalysis is to Find the insecurities of the cryptosystem


Transmission errors are propagated in the following modes, except Output Feedback Mode

The number of keys used in Triple DES algorithm is 3

Kerchkoff's principle emphasizes that the cryptosystem should be accessible to the adversary
without inconvenience. True

X signs a message digitally and sends it to Y. Which of the following is required for Y to verify the
authenticity of the message? X's public key

The cryptographic method that is considered to be genuinely unbreakable is? One-time pad

Which of the following cryptographic strategies may be used to overcome Man-in-the-Middle


attacks? Authentication

The most frequently used letters in the English language are? e, t

The Diffie-Hellman algorithm is applicable for the exchange of keys between two parties only. False

23. Which of the following cryptographic strategy may be used to overcome Man-inthe Middle
attacks – Authorization

24. Frequency analysis can be performed on polyalphabetic ciphers which makes it weaker than
monoalphabetic ciphers -- False , True

25. The cryptographic method that is considered to be truly unbreakable -- One-time pad

26. Which of the following is widely used in cryptography to create a trapdoor function to facilitate
exchange of keys -- Modular

27. Which among the following algorithms is designed based on the Feistel Cipher—DES

28. Diffie-Hellman algorithm is applicable for exchange of keys between two parties only. – True

29. digital sig -- ASymmetric key System/Public

30. Which among the following best describes hash collision attack? – different input same
hash(Different input strings, same hash result)

31. The avalanche effect is an undesirable property in cryptographic algorithms.-- False 32. The
number of keys used in Triple DES algorithm -- 3

33. Which among the following is the most resistant to frequency analysis? -- Vig34. The uses of
hashing algorithms include: -- Data autho

Which among the following is an active attack? User Impersonation

Digital Signature is implemented using the ? public key system

The size of the output produced by hash functions is? Fixed based
Select the mode in which computations do not depend on outputs from previous stages. Electronic
Code Book

The Diffie-Hellman algorithm exploits the computational complexity of the _ problem. Discrete
logarithm

The cryptographic device based on rotor systems, used by the Germans during World War II is
__________.Enigma

Based on the network security protocols, which of the following algorithms are used to generate
message digests? MD5

Which of the following is most suitable to secure passwords? Encryption

Which of the following is a characteristic of block ciphers? Key dependent S-boxes

The number of keys used in Triple DES algorithm is? 3

Which among the following may be addressed using message authentication? All the options.

The number of keys used in Triple DES algorithm is __________.3

Digital Signature is implemented using the __________.Public key system

Which among the following is the most resistant to frequency analysis? Random polyalphabetic

The use of hashing algorithms includes ________.All the options

In digital cryptography, each character is represented as__________.8 bits

X signs a message digitally and sends it to Y. Which of the following is required for Y to verify the
authenticity of the message? X’s public key

Select the mode in which computations do not depend on outputs from previous stages? Electronic
Code Book

Transmission errors are propagated in the following modes, except __________.Output Feedback
Mode

What is the size of the hash value produced by the MD5 algorithm? 128 bits

Which among the following algorithms is designed based on the Feistel Cipher? DES

You might also like