0% found this document useful (0 votes)
136 views

Module 3 - Quiz

This document contains the solutions to a 10 question multiple choice quiz on cryptography concepts. It provides the question, available multiple choice answers, the answer selected, and the correct answer. The quiz covers topics like cryptographic assumptions, types of cryptographic attacks, cryptographic algorithms like DES, AES, their properties, public/private key encryption, digital signatures, hash functions, and how RSA and AES can be used together.

Uploaded by

bobbysingh727272
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
136 views

Module 3 - Quiz

This document contains the solutions to a 10 question multiple choice quiz on cryptography concepts. It provides the question, available multiple choice answers, the answer selected, and the correct answer. The quiz covers topics like cryptographic assumptions, types of cryptographic attacks, cryptographic algorithms like DES, AES, their properties, public/private key encryption, digital signatures, hash functions, and how RSA and AES can be used together.

Uploaded by

bobbysingh727272
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

7/8/23, 7:08 PM ifacet

Test Paper Solution

Test Name : Module 3 Quiz for Batch 1

Section: Module 3 Quiz

Question Number : 1

Which of the following assumptions in cryptography is reasonable in real-life situations

( A ) A cryptographic algorithm will remain secret forever

(B) Decryption key will remain secret forever

(C) Recovery of a 128-bit key using brute-force attack is not impossible

( D ) A substitution cipher is secure under known-plaintext attack

My Answer: B | Correct Answer: C

Marks for correct answer : 1 ; Negative Marks : 0Question Type : Single Choice Answer Type
Question Number : 2
The arrangement of attacks – known-plaintext, ciphertext-only, chosen-plaintext – in increasing order of
strength is

( A ) Known-plaintext, chosen-plaintext, ciphertext-only

(B) Chosen-plaintext, known-plaintext, ciphertext-only

( C ) Ciphertext-only, chosen-plaintext, known-plaintext

( D ) Ciphertext-only, known-plaintext, chosen-plaintext

My Answer: A | Correct Answer: D

Marks for correct answer : 1 ; Negative Marks : 0Question Type : Single Choice Answer Type
Question Number : 3
The non-linear operation in DES is

( A ) S-box

( B ) Permutation

(C) Expansion

( D ) XOR with round key

My Answer: A | Correct Answer: A

Marks for correct answer : 1 ; Negative Marks : 0Question Type : Single Choice Answer Type
Question Number : 4
The non-linear operation in AES is

( A ) ByteSub

(B) ShiftRow

(C) MixColumn

( D ) XOR with round key

My Answer: A | Correct Answer: A

Marks for correct answer : 1 ; Negative Marks : 0Question Type : Single Choice Answer Type
Question Number : 5

AES is a

( A ) Public-key encryption algorithm

(B) Private-key encryption algorithm

(C) Digital signature algorithm

https://ifacet.ilearn.edusquares.com/questionpaper/32 1/2
7/8/23, 7:08 PM ifacet

( D ) Hash function
Test Paper Solution
My Answer: A | Correct Answer: B

Marks for correct answer : 1 ; Negative Marks : 0Question Type : Single Choice Answer Type
Question Number : 6
In a public- encryption algorithm, the secret part is

( A ) Encryption-key

(B) Encryption algorithm

(C) Decryption-key

( D ) Decryption algorithm

My Answer: C | Correct Answer: C

Marks for correct answer : 1 ; Negative Marks : 0Question Type : Single Choice Answer Type
Question Number : 7
Digital signatures are useful for

( A ) Keeping information secret

(B) Ensuring that information cannot be changed

(C) Authenticating the information

( D ) None of the above

My Answer: C | Correct Answer: C

Marks for correct answer : 1 ; Negative Marks : 0Question Type : Single Choice Answer Type
Question Number : 8
Which of the following is easy for a cryptographically secure hash function ℎ

( A ) Given a string 𝑦 , find 𝑥 such that ℎ𝑥 = 𝑦

(B) Given a string 𝑥 , find 𝑧 such that ℎ𝑥 = ℎ ( 𝑧 )

(C) Find 𝑥 and 𝑧 such that ℎ𝑥 = ℎ ( 𝑧 )

( D ) Given a string 𝑥 , compute ℎ𝑥

My Answer: D | Correct Answer: D

Marks for correct answer : 1 ; Negative Marks : 0Question Type : Single Choice Answer Type
Question Number : 9
Blockchains are useful for:

( A ) Keeping information secret

(B) Ensuring that information cannot be changed

(C) Authenticating the information

( D ) None of the above

My Answer: B | Correct Answer: B

Marks for correct answer : 1 ; Negative Marks : 0Question Type : Single Choice Answer Type
Question Number : 10
To encrypt and send a large amount of data between Anubha and Braj, RSA is used for exchanging a new
AES and then the data is sent after encrypting with AES using the new . One can break the security of
this system if one knows

( A ) The RSA decryption key

(B) The new AES key

(C) Both RSA and AES keys

( D ) All of the above

My Answer: C | Correct Answer: D

Marks for correct answer : 1 ; Negative Marks : 0Question Type : Single Choice Answer Type

https://ifacet.ilearn.edusquares.com/questionpaper/32 2/2

You might also like