In Cryptographic Terms
In Cryptographic Terms
aspx
In cryptographic terms, what does cipher indicate? The algorithm used for encryption and
decryption
The cryptographic device based on rotor systems, used by the Germans during World War II is
Enigma
The cipher generated by combining multiple transformations to enhance the security of the
resultant cipher is Product ciphers
Which of the following poses challenges in the breaking of the Vigenère Cipher? Length of the Key
In which of the following cryptographic methods is the order of the units in the data rearranged to
form the ciphertext? Transpositional ciphers
The algorithm that is considered to have electrified non-military cryptology and cryptanalysis is
Vernam Cipher
The strategy used to ensure that the message is a multiple of the cipher block size without
compromising the size of the ciphertext is Ciphertext stealing
Frequency analysis can be performed on polyalphabetic ciphers, which makes it weak. True
The hash function value used in message authentication is also known as Message Digest
What is the size of the hash value produced by the MD5 algorithm? 128 bits
Which among the following algorithms is designed based on the Feistel Cipher? DES
Which among the following are steps in each round of AES algorithm? Substitute Bytes
The idea behind "confusion" in cryptography is to hide the relationship between the plaintext and
ciphertext. False
Kerchkoff's principle emphasizes that the cryptosystem should be accessible to the adversary
without inconvenience. True
X signs a message digitally and sends it to Y. Which of the following is required for Y to verify the
authenticity of the message? X's public key
The cryptographic method that is considered to be genuinely unbreakable is? One-time pad
The Diffie-Hellman algorithm is applicable for the exchange of keys between two parties only. False
23. Which of the following cryptographic strategy may be used to overcome Man-inthe Middle
attacks – Authorization
24. Frequency analysis can be performed on polyalphabetic ciphers which makes it weaker than
monoalphabetic ciphers -- False , True
25. The cryptographic method that is considered to be truly unbreakable -- One-time pad
26. Which of the following is widely used in cryptography to create a trapdoor function to facilitate
exchange of keys -- Modular
27. Which among the following algorithms is designed based on the Feistel Cipher—DES
28. Diffie-Hellman algorithm is applicable for exchange of keys between two parties only. – True
30. Which among the following best describes hash collision attack? – different input same
hash(Different input strings, same hash result)
31. The avalanche effect is an undesirable property in cryptographic algorithms.-- False 32. The
number of keys used in Triple DES algorithm -- 3
33. Which among the following is the most resistant to frequency analysis? -- Vig34. The uses of
hashing algorithms include: -- Data autho
The size of the output produced by hash functions is? Fixed based
Select the mode in which computations do not depend on outputs from previous stages. Electronic
Code Book
The Diffie-Hellman algorithm exploits the computational complexity of the _ problem. Discrete
logarithm
The cryptographic device based on rotor systems, used by the Germans during World War II is
__________.Enigma
Based on the network security protocols, which of the following algorithms are used to generate
message digests? MD5
Which among the following may be addressed using message authentication? All the options.
Which among the following is the most resistant to frequency analysis? Random polyalphabetic
X signs a message digitally and sends it to Y. Which of the following is required for Y to verify the
authenticity of the message? X’s public key
Select the mode in which computations do not depend on outputs from previous stages? Electronic
Code Book
Transmission errors are propagated in the following modes, except __________.Output Feedback
Mode
What is the size of the hash value produced by the MD5 algorithm? 128 bits
Which among the following algorithms is designed based on the Feistel Cipher? DES