0% found this document useful (0 votes)
196 views10 pages

Cns

In RSA, (n) is calculated as (p)(q), where p and q are prime numbers. An asymmetric-key cipher uses 2 keys, a public key and a private key. RSA stands for Rivest, Shamir, and Adleman, who developed the RSA algorithm.

Uploaded by

princeho124
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
196 views10 pages

Cns

In RSA, (n) is calculated as (p)(q), where p and q are prime numbers. An asymmetric-key cipher uses 2 keys, a public key and a private key. RSA stands for Rivest, Shamir, and Adleman, who developed the RSA algorithm.

Uploaded by

princeho124
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

001. In RSA, (n) = _______ in terms of p and q.

C
A (p)/(q) B (p)(q)
C (p-1)(q-1) D (p+1)(q+1)
002. Sender chooses p = 107, e1 = 2, d = 67, and the random integer is r=45. Find the B
plaintext to be transmitted if the ciphertext is (28,9).
A 45 B 66
C 76 D 13
003. What is the general equation for elliptic curve systems? D
A y3+b1 xy+b2 y=x3+a1 x2+a2 x+a3 B y3+b1 x+b2 y=x2+a1 x2+a2 x+a3
C y2+b1 xy+b2 y=x3+a1 x2+a2 D y2+b1 xy+b2 y=x3+a1 x2+a2 x+a3
004. For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 and A
find the cipher text.
A C=80 B C=92
C C=56 D C=23
005. In Singular elliptic curve, the equation x^3+ax+b=0 does ____ roots. A
A does not have three distinct B has three distinct
C has three unique D has three distinct unique
006. If P = (1,4) in the elliptic curve E13(1, 1) , then 4P is D
A (4, 2) B (7, 0)
C (5, 1) D (8, 1)
007. Which Cryptographic system uses C1 = (e r) mod p and C1 = (e rx P) mod p at the B
1 2
encryption side?
A Elgamal B RSA
C Rabin D Whirlpool
008. In the RSA algorithm, we select 2 random large values p and q. Which of the following C
is the property of p and q?
A p and q should be divisible by (n) B p and q should be co-prime
C p and q should be prime D p/q should give no remainder
009. For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher C
message=80 and thus find the plain text.
A 54 B 43
C 5 D 24
010. On adding the two points P (4,2) and Q (10, 6) in the elliptic curve E11(1,1) we get- B
A (9,3) B (6,4)
C (7,5) D (2,8)
011. In Elgamal cryptosystem, given the prime p=31. What is the respective plaintext C
character for C = (27, 20)?
A L B O
C H D M
012. How many real and imaginary roots does the equation y2=x3-1 have? D
A 2 real, 1 imaginary B all real
C all imaginary D 2 imaginary, 1 real
013. n = 35; e = 5; C = 10. What is the plaintext (use RSA) ? D
A 3 B 7
C 8 D 5
014. In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is P + A
Q if P = (0,-4) and Q = (1, 0)?
A (15, -56) B (-23, -43)
C (69, 26) D (12, -86)
015. In Elgamal cryptosystem, given the prime p=31.Choose e1= first primitive root of p and C
d=10, calculate e2.
A 24 B 36
C 25 D 62
016. In Elgamal cryptosystem, given the prime p=31.Encrypt the message HELLO; use 00 B
to 25 for encoding. The value of C2 for character O is----
A 23 B 09
C 07 D 27
017. Multiply the point P=(8, 1) by a constant 3, thus find 3P, in the elliptic curve E13(1, 1) A
A (10,7) B (12,6)
C (11,1) D (9,8)
018. An asymmetric-key (or public-key) cipher uses------- C
A 3 key B 1 key
C 2 key D 4 key
019. In RSA, we select a value e such that it lies between 0 and (n) and it is relatively prime B
to (n).
A True B False
C May be D Can &#39t say
020. For the point P (7, 0) defined in the curve E13(1, 1). What is P? D
A (7,1) B (8,12)
C (8,1) D (7,0)
021. Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find C
ciphertext. The Ciphertext is:
A 42 B 93
C 114 D 103
022. Bob selects E67(2, 3) as the elliptic curve over GF(p). He selects e1 = (2, 22) and d = D
4. Then he calculates e2 = d e1 .What is the value of e2?
A (23,49) B (16,55)
C (12,19) D (13,45)
023. In the elliptic curve group defined by y2= x3- 17x + 16 over real numbers, what is 2P if A
P = (4, 3.464)?
A (12.022, -39.362) B (32.022, 42.249)
C (11.694, -43.723) D (43.022, 39.362)
024. Using Rabin cryptosystem with p=23 and q=7 Encrypt P=24 to find ciphertext. The B
Cipher text is--
A 42 B 93
C 74 D 12
025. For RSA to work, the value of P must be less than the value of-- C
A p B q
C n D r
026. Which Cryptographic system uses C1 = (e1r) mod p and C1 = (e2r x P) mod p at the A
encryption side?
A elgamal B RSA
C rabin D whirlpool
027. RSA stands for--- D
A Rivest, Shaw, and Adleman B Robert, Shamir, and Anthoney
C Roger, Shamir, and Adrian D Rivest, Shamir, and Adleman
028. In the RSA public key cryptosystem, which one of the following numbers will always be B
largest?
A e B n
C p D q
029. In Elgamal cryptosystem, given the prime p=31. Encrypt the message HELLO; use 00 D
to 25 for encoding. The value of C2 for character L is ----
A 12 B 7
C 20 D 27
030. In Asymmetric key Cryptography, although RSA can be used to encrypt and decrypt B
actual messages, it is very slow if the message is------
A short B long
C flat D thin
031. For the point P (11, 2) defined in the curve E13(1, 1). What is P? C
A (12,4) B (10,7)
C (11,11) D (11,12)
032. Bob selects E67(2, 3) as the elliptic curve over GF(p). He selects e1 = (2, 22) and d = A
4. Then he calculates e2 = d e1 and the publicly announces the tuple (E, e1, e2). Now,
Alice wants to send the plaintext P = (24, 26) to Bob and she selects r = 2. What are
C1 and C2?
A C1=(35,1) ; C2 =(21,44) B C1=(44,21) ; C2 =(1,35)
C C1=(44,21) ; C2 =(44,21) D C1=(21,44); C2 =(35,1)
033. Which cryptographic algorithm forms the basis of the El Gamal cryptosystem? B
A RSA B Diffie-Hellman
C 3DES D IDEA
034. In asymmetric key cryptography, the private key is kept by __________ D
A sender B sender and receiver
C all the connected devices to the D receiver
network
035. Which one of the following algorithm is not used in asymmetric-key cryptography? A
A electronic code book algorithm B RSA algorithm
C diffie-hellman algorithm D DSA algorithm
036. Which International Telecommunications Union (ITU) standard governs the creation B
and endorsement of digital certificates for secure electronic communication?
A X.500 B X.509
C X.900 D X.905
037. In an RSA system the public key of a given user is e = 31, n = 3599. What is the A
private key of this user?
A 3031 B 2412
C 2432 D 1023
038. If a 2,048-bit plaintext message was encrypted with the El Gamal public key C
cryptosystem, how long would the resulting ciphertext message be?
A 1,024 bits B 2,048 bits
C 4,096 bits D 8,192 bits
039. Which one of the following algorithms is not supported by the Digital Signature C
Standard?
A Digital Signature Algorithm B RSA
C El Gamal DSA D Elliptic Curve DSA
040. ElGamal encryption system is __________ B
A symmetric key encryption algorithm B asymmetric key encryption algorithm
C not an encryption algorithm D block cipher method
041. Kerberos is an encryption based system that uses----------- A
A Secret key encryption B Data key encryption
C Private key encryption D Public key encryption
042. The secret key between members needs to be created as a ________ key when two B
members contact KDC.
A public B session
C complimentary D private
043. Message _______ means that the receiver is ensured that the message is coming from C
the intended sender not an imposter.
A confidentiality B integrity
C authentication D Authorization
044. For a client server authentication, the client requests from the KDC a ----- for access to A
a specific asset.
A ticket B local
C token D user
045. A(n) ---------function creates a message digest out of a message. C
A decryption B encryption
C hash D integrity
046. The digital signature standard proposed in---- B
A 1990 B 1991
C 1993 D 1997
047. Which of the following is digital certificate standard? D
A X.506 B X.507
C X.508 D X.509
048. Which of the following is not an element/field of X.509 certificate? C
A Issuer name B signature
C Serial modifier D Issuer unique identifier
049. When a hash function is used to provide message authentication, the hash function B
value is referred to as ---
A Message Field B Message Digest
C Message Score D Message Leap
050. What is the correct order of operation within each round of the Whirlpool algorithm? D
A Add round key, Substitute bytes, Mix B Substitute bytes, Add round key, Shift
rows, Shift columns columns, Mix rows
C Mix rows, Substitute bytes, Shift D Substitute bytes, Shift columns, Mix
columns, Add round key rows, Add round key
051. How many round constants (RCs) are required in Whirlpool? A
A 10 B 11
C 12 D 21
052. What is a one-way password file? C
A A scheme in which the password is B A scheme in which the password is
jumbled and stored XOR with a key and stored
C A scheme in which the hash of the D A scheme in which the password is
password is stored passed through a PRF, which is then
stored
053. Which round provides linear diffusion in the Whirlpool Algorithm? A
A Mix Rows B Add Key
C Substitute Bytes D Shift Rows
054. Message authentication code is also known as---- C
A key code B hash code
C keyed hash function D message key hash function
055. For each -------, the Kerberoes KDC maintains a database of the realms principal and B
the principals associated secret keys.
A key B realm
C document D tag
056. The responsibility of a certification authority for digital signature is to authenticate the -- C
A Hash function used B Private keys of subscribers
C Public keys of subscribers D Keys used in DES
057. In SHA-512, W16 is dependent on---------- C
A W0,W3,W7,W13 B W3,W7,W11,W15
C W0,W1,W9,W14 D W0,W1,W10,W13
058. What is the number of round computation steps in the SHA-256 algorithm? C
A 80 B 76
C 64 D 70
059. Which algorithm has the most execution latency? D
A SHA-1 B MD-5
C Whirlpool D SHA-2
060. In SHA-512, the message is divided into blocks of size ______ bits for the hash A
computation.
A 1024 B 512
C 256 D 1248
061. What is the effectiveness of an n-bit hash value? B
A 2n B 2-n
C 22n D 2-2n
062. What is the maximum length of the message (in bits) that can be taken by SHA-512? A
A 2128 B 2256
C 264 D 2192
063. Which one of the following is not an application hash functions? B
A One-way password file B Key wrapping
C Virus Detection D Intrusion detection
064. Which hash algorithm is the most hardware intensive among the following? D
A SHA-1 B SHA-2
C MD-5 D Whirlpool
065. How many rounds are there in one Whirlpool Iteration? B
A 3 B 4
C 6 D 8
066. What is the number of operation required to come up with 2 messages having the A
same message digest in SHA-512?
A 2256 B 2512
C 21024 D 2128
067. The expected workload of generating a collision is of the order of ______ executions of A
Whirlpool.
A 2(n/2) B 2(n-1)
C 2(n) D 2(2n)
068. In SHA-3, for a message digest size of 256, what is the bitrate r (capacity = 512) ? B
A 576 B 1088
C 1152 D 832
069. Which one of these is not a Whirlpool function? D
A Add Key B Substitute Bytes
C Mix Rows D Shift Rows
070. The underlying structure of the SHA-3 algorithm is referred to as--- C
A Layer construction B Texture construction
C Sponge construction D Cement construction
071. Before the first round of the Whirlpool algorithm, which is the operation that takes C
place?
A Substitution of Bytes B Mixing of Rows
C Addition of Key D Shifting of Columns
072. SHA-1 produces a hash value of--- B
A 256 bits B 160 bits
C 180 bits D 128 bits
073. Another name for Message authentication codes is----- C
A cryptographic codebreak B cryptographic codesum
C cryptographic checksum D cryptographic checkbreak
074. Which of the following is not true for whirlpool hashing function? A
A It is a two way hashing function B It is based on a 512 bit block cipher
C The block cipher is similar to AES D It is resistant to differential attacks
structure
075. What is the full-form of CMAC? B
A Code-based MAC B Cipher-based MAC
C Construct-based MAC D Collective-based MAC
076. How many rounds does the Whirlpool algorithm undergo? D
A 16 B 12
C 14 D 10
077. Cryptographic hash functions execute faster in software than block ciphers. D
A Statement is correct B Statement is incorrect
C Depends on the hash function D Depends on the processor
078. What is the value of ipad in the HMAC structure? B
A 00111110 B 00110010
C 10110110 D 01110110
079. How many rounds are present in each iteration function of SHA-3? C
A 3 B 4
C 5 D 6
080. Another name for the Whirlpool key is----- D
A CState B LState
C Estate D KState
081. Which one of the following is not a public key distribution means? B
A Public-Key Certificates B Hashing Certificates
C Publicly available directories D Public-Key authority
082. Which of the following is not an element/field of the X.509 certificates? C
A Issuer unique Identifier B Signature
C Serial Modifier D Issuer Name
083. Which of the following public key distribution systems is most secure? A
A Public-Key Certificates B Public announcements
C Publicly available directories D Public-Key authority
084. The subject unique identifier of the X.509 certificates was added in which version? A
A 1 B 2
C 4 D 3
085. What is the size of the s-box table/matrix in Whirlpool? B
A 88 B 16 16
C 8 16 D 16 8
086. How many add round key functions are present in the Whirlpool algorithm? C
A 16 B 18
C 11 D 10
087. Which systems use a timestamp? i) Public-Key Certificates ii) Public announcements C
iii) Publicly available directories iv) Public-Key authority
A i) and ii) B iii) and iv)
C i) and iv) D iv) only
088. Certificate extensions fall into 3 categories. Which one of the following is not a D
Certificate extensions category?
A Subject and Issuer attributes B Key and Policy information
C Certification path constraints D All of the above are Certificate
extensions categories
089. The issuer unique identifier of the X.509 certificates was added in which version? B
A 1 B 2
C 3 D 4
090. Which system uses a trusted third party interface? A
A Public-Key Certificates B Public announcements
C Publicly available directories D Public-Key authority
091. Which of these systems use timestamps as an expiration date? A
A Public-Key Certificates B Public announcements
C Publicly available directories D Public-Key authority
092. How many handshake rounds are required in the Public-Key Distribution Scenario? D
A 5 B 3
C 4 D 7
093. X.509 certificate recommends which cryptographic algorithm? B
A DES B RSA
C AES D Rabin
094. CRL stands for- C
A Cipher Reusable List B Certificate Revocation Language
C Certificate Revocation List D Certificate Resolution Language
095. A digital signature is----- A
A An authentication of an electronic B A bit string giving identity of a
record by trying it uniquely to a key correspondent
only a sender knows
C A unique identification of a sender D An encrypted signature of a sender
096. Public key system is useful because B
A It uses two keys B There is no key distribution problem
as public key can be kept in a
commonly accessible database
C Private key can be kept secret D It is a symmetric key system
097. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if B
two parties are not ---------
A Joined B Authenticated
C Submit D Separate
098. A total of seven messages are required in the Public-Key distribution scenario. C
However, the initial five messages need to be used only infrequently because both A
and B can save the others public key for future a technique known as ____
A time stamping B polling
C caching D squeezing
099. The certificate message is required for any agreed-on key exchange method except- A
A anonymous diffie- hellmanc B RSA
C ephemeral diffie- hellman D fixeddiffie- hellmand.
100. How many bytes of the secret key is generated using Diffie-Hellman D
encryption/decryption scheme?
A 871 B 1024
C 962 D 256
101. Computation of the discrete logarithm is the basis of the cryptographic system------------ C
A symmetric cryptography B asymmetric cryptography
C diffie-hellman key exchange D secret key cryptography
102. What does IP means? B
A Instance Principle B Internet Protocol
C Instant Protocol D Intellectual Property
103. One of the problems with using SET protocol is-------- C
A The merchants risk is high as he B The credit card company should
accepts encrypted credit card check digital signature
C The bank has to keep a database D The bank has to keep a database of
ofthe public keys of all customers digital signatures of all customers
104. What are TLS and SSL? C
A Internet Protocols B Network Layers
C Cryptographic protocols D Internet Layers
105. Certification of Digital signature by an independent authority is needed because---- C
A It is safe B It gives confidence to a business
C The authority checks and assures D Private key claimed by a sender may
customers that the public key indeed not be actually his.
belongs to the business which claims
its ownership
106. The SET protocol is used for---- A
A Credit card payment B Cheque payment
C Electronic cash payment D Payment of small amounts for
Internet services
107. In SET protocol a customer encrypts credit card number using------- B
A His private key B Banks public key
C Banks private key D Merchants public key
108. In SET protocol a customer sends a purchase order----------- D
A Encrypted with his public key B In plain text form
C Encrypted using Banks public key D Using digital signature system
109. USENET is related to which of the following Public Key distribution schemes? B
A Public-Key Certificates B Public announcements
C Publicly available directories D Public-Key authority
110. Why did SSL certificate require in HTTP? D
A For making security weak B For making information movefaster
C For sending and receiving emails D For encrypted data sent over http
unencrypted protocol
111. PGP makes use of which cryptographic algorithm? C
A DES B AES
C RSA D Rabin
112. The bank has to have the public keys of all customers in SET protocol as it has to ------ A
-
A Check the digital signature of B Communicate with merchants
customers
C Communicate with merchants credit D Certify their keys
card company
113. SSL is a predecessor of which cryptographic protocol? B
A IPSec B TLS
C SSL 3.0 D HTTPS
114. In the Sublayer of which of the following does TLS and SSL performs the data D
encryption of network connections?
A Presentation layer B Session and presentation layer
C Session layer D Application layer
115. What is the function of mail transfer agent? C
A It resolves the names B It helps in reading the emails
C It receives and delivers the messages D It detects emails carrying virus
116. Which of them is not a major way of stealing email information? B
A stealing cookies B reverse engineering
C password phishing D social engineering
117. ---------- is the method for keeping sensitive information in email communication & A
accounts secure against unofficial access, loss, or compromise.
A email security B email hacking
C email protection D email safeguarding
118. The cryptography algorithms used in S/MIME are --------- C
A IDEA B RC4
C RSA, DES-3 D RC5
119. Who created PGP? A
A Phil Zimmermann B Tim Berners-Lee
C Marc Andreessen D Ken Thompson
120. What is the key size allowed in PGP? C
A 1024-1056 B 1024-4056
C 1024-4096 D 1024-2048
121. Which of the following is not a transport layer vulnerability? D
A mishandling of undefined , poorly B the vulnerability that allows
defined fingerprinting & other enumeration of
host information
C overloading of transporting layer D unauthorized network access
mechanisms
122. There are -----major ways of stealing email information. B
A 2 B 3
C 4 D 5
123. Why did SSL certificate require in HTTP? C
A for making security weak B for making information move faster
C for encrypted data sent over http D for sending and receiving emails
protocol unencrypted
124. EDI over Internet uses ----- D
A SGML to send business forms B HTTP to send business forms
C FTP to send business forms D MIME to attach EDI forms to email
messages
125. PGP offers ----- block ciphers for message encryption D
A CAST B triple DES
C IDEA D IDEA, CAST, triple DES
126. ----------- is a famous technological medium for the spread of malware, facing problems D
of spam, & phishing attacks.
A cloud B pen drive
C website D email
127. Unsolicited Bulk E-mails are called-------- C
A SMS B MMS
C spam emails D malicious emails
128. Which of them is an example of grabbing email information? A
A cookie stealing B reverse engineering
C port scanning D banner grabbing
129. S/MIME stands for --------- B
A Standard Multipurpose Internet Mail B Secure Multipurpose Internet Mail
Extensions. Extensions.
C Secure Multipurpose International D Standard Multipurpose International
Mail Extensions Mail Extensions.
130. Which of the following protocols is used on the sender side when an electronic mail is C
sent from one host to another?
A POP3 B HTTP
C SMTP D TLS
131. IKE is a complex protocol based on --------- other protocols B
A 2 B 3
C 4 D 5
132. What is IMAP? D
A Internet Messaging Application B Intranet Messaging Application
C Internet Message Application D Internet Message Access Protocol
133. --is used for hiding the payment information from the merchant. A
A SET B SSL
C SHTTP D TSP
134. For secure EDI transmission on Internet---- is used C
A MIME B PGP
C S/MIME D TCP/IP
135. PGP is used in------ B
A browser security B email security
C ftp security D wifi security
136. In S/MIME,MLA stands for --- A
A Mailing List Agent. B Multipurpose List Agent.
C Mail Lock Agent. D Message Link Agent
137. Which one of the following is not a higher layer SSL protocol? C
A Alert Protocol B Handshake Protocol
C Alarm Protocol D Change Cipher Spec Protocol
138. Which protocol is used to convey SSL related alerts to the peer entity? D
A Handshake Protocol B Upper-Layer Protocol
C Change Cipher Spec Protocol D Alert Protocol
139. In the SSL Protocol, each upper layer message if fragmented into a maximum of D
__________ bytes.
A 2^16 B 2^32
C 2^12 D 2^14
140. Encryption and Decryption is the responsibility of ___ Layer. C
A Physical B Network
C Application D Datalink
141. In tunnel mode, IPSec protects the------ A
A entire IP packet B IP header
C IP payload D IP trailer
142. Which of the following is not a strong security protocol? C
A HTTPS B SSL
C SMTP D SFTP
143. IPSec is designed to provide security at the-------- B
A transport layer B network layer
C application layer D session layer
144. Calculation of the certificate_verify in TLS involves the use of a finished_label. The B
finished_label is the string-------------
A client finished for the client B client finished for the client, server
finished for the server
C server finished for the server D client finished for the server, server
finished for the client
145. An HTTP connection uses port ___ whereas HTTPS uses port __ and invokes SSL. C
A 40; 80 B 60; 620
C 80; 443 D 620; 80
146. ___ is a generic protocol that supports many different key exchange methods. A
A ISAKMP B FTP
C TCP/IP D HTTP
147. The full form of SSL is-- B
A Serial Session Layer B Secure Socket Layer
C Session Secure Layer D Series Socket Layer
148. SSL primarily focuses on---------- A
A integrity and authenticity B integrity and non-repudiation
C authenticity and privacy D confidentiality and integrity
149. Which of the following is not a secure shell protocol? B
A Transport Layer Protocol B Secure Layer Protocol
C Connection Protocol D User Authentication Protocol
150. In tunnel mode, IPSec protects the --- D
A IP trailer B IP payload
C IP header D Entire IP packet

You might also like