Answer Final 2023
Answer Final 2023
01. In Symmetric key cryptography, for n users we need _____ number of keys
a) n b) (n-1)/3 c) n(n-1)/2 d) n2
02. Asymmetric key cryptography uses both a public and private key
a) True b) False
03. In Asymmetric key cryptography, for n users we need _____ number of keys
a) n b) (n-1)/3 c) n(n-1)/2 d) n2
05. If Alice and Bob are communicating C-E pub K Alice (M) in a nondefinitional channel, the message being
sent to _____
a) Bob b) Alice c) either Bob or Alice d) none of them
Bob is sending a message to Alice, Where Alice public and private key are K Alice1 and K Alice2
respectively.
06. The cipher generated by Bob is _____
a) C-EK Alice1 (M) b) C-EK Alice2 (M) c) C-DK Alice1 (M) d) C-DK Alice2 (M)
08. Secret and private keys are two terms used to refer to the same thing
a) True b) False
10. Distributing the public key through a public-key distribution channel requires
a) Confidentiality b) Integrity c) Authentication d) b and c
11. Alice needs _____ private key(s) to communicate with n people in the community
a) n(n-1) b) n c) n-1 d) 1
12. All plain text and cipher text in asymmetric encryption treated as _____
a) String b) Integers c) blocks d) decimals
13. Both symmetric and Asymmetric encryption can used exchangeable without any limitations.
a) True b) False
16. The following security mechanism can provide confidentiality, digital signature exchange services
a) Symmetric encryption b) Asymmetric Encryption
c) Advanced encryption standard d) None of the above
18. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the
property of ‘p’ and ‘q’?
a) p and q should be divisible by Φ(n) b) p and q should be co-prime
c) p and q should be prime d) p/q should give no remainder
20. In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Φ(n).
a) True b) False
21. Which of the following is not of the uses of the Asymmetric key cryptography
a) Cryptography b) Digital Signature c) Key exchange d) Hashing
22. Insertion of messages into the network from a fraudulent source is considered as ……… attack.
a) Disclosure b) Traffic analysis c) Masquerade d) Content modification
26. Message Authentication can be ensured through the following mechanisms except _____
a) Symmetric Encryption b) Asymmetric encryption
c) Message authentication code d) Hash functions
27. The following scenario ensures _____
a) Authentication b) Confidentiality c) Integrity d) Both a and b
28. The normal flow of public key encryption provides which of the following?
a) Integrity b) Confidentiality c) Digital signature d) Both b and c
29. The normal flow of public key encryption does not provide authentication since any opponent could
use the _____ to encrypt a message, claiming to be the source.
a) Destination public key b) Destination private key
c) Source public key d) Source private key
31. Symmetric encryption fails to ensure authentication in which case of the following?
a) The message is too long b) The message is meaningless bit sequence
c) The message is readable d) None of the above
32. In the external error control, the frame check sequence is calculated _____ Encryption of the message
a) After b) Before c) Simultaneously d) Both a or b
33. Encrypting messages using the source private key provides _____
a) Authentication b) Digital signature c) Confidentiality d) Both a and b
34. An authentication technique involves the use of a secret key to generate a small fixed-size block of
data, appended to the message is known as _____
a) Hash function b) Cryptographic algorithm
c) Frame check sequence d) Message authentication code
35. When public key cryptography is used for ensuring confidentiality and authentication the encryption
algorithm is adopted _____
a) Once b) Twice c) Three times d) Four times
36. Which is much better for encrypting long messages?
a) Symmetric encryption b) Asymmetric encryption
c) Block cipher d) Stream cipher
37. The message authentication code ensures the following except _____
a) Authentication b) Integrity c) Timing and sequence d) Confidentiality
38. Message authentication code is preferred than symmetric encryption while confidentiality is not
required
a) True b) False
41. Message authentication code provides digital signature since both sender and receiver share the same
keys.
a) True b) False
44. Encrypting the hash code with the source private key using a public key cryptography algorithm is
a) Authentication b) Digital signature c) Integrity d) Confidentiality
46. Confidentiality can only be provided if we perform message encryption before the MAC generation.
a) True b) False
48. The encrypted message of the following plain text "sun" using Caesar cipher with key = 2
a) NUS b) UWP c) WDP d) QSL
49. The encrypted message of the following plain text "third year" using Playfair with key "fci students"
a) ilnwtpnupz b) ilnwnutppz c) iltpnwnupz d) pziltpnwuz
50. In RSA if n = 187, E = 23, P.T = 26 find p _____, q _____, d _____.
a) 11, 17, 6 b) 17, 6, 11 c) 17, 11, 7 d) 7, 17, 11
52. On Encrypting "thepepsiisintherefrigerator" using Vigenère Cipher System using the keyword
"HUMOR" we get cipher text.
a) abqdnwewuwjphfvrrtrfznsdokvl b) abqdvmwuwjphfvvyyrfznydokvl
c) tbqyrvmwuwjphfvvyyrfznydokvl d) baiuvmwuwjphfoeiyrfznydokvl
53. What will be the encrypted text corresponding to plain text "CLASSIFIED" using Row transposition
cipher with a keyword as "GAMES"?
a) LFDSIASECI b) SECIAISDFL c) CILFAISESD d) LFSECIAISD
54. What will be the plain text corresponding to cipher text “BPKYHFCY” if Playfair cipher is used with
keyword as "SECRET" (assuming j is combined with i)?
a) DOOAR b) WORLD c) DOLLAR d) HELLO
55. What will be the plain text corresponding to cipher text "SCSEMG" if rail fence cipher is used with
key value 2?
a) MSGSEC b) SECMSG c) GSMSEC d) SECGSM
56. If a message (meet me after the toga party) is encrypted using Caesar cipher to be (PHHW PH
DIWHU WKH WRJD SDUWB) then the key used is
a) 2 b) 3 c) 4 d) 5
58. What will be the ciphered text if the string "SANFOUNDRY" is given as input to the code of Vigenère
cipher with keyword as "HELLO"?
a) UEWIIDKLL b) ZEYQCOCM
c) ZEYQCBROCM d) ZEYQCBROCMJDH
59. For p = 11 and q = 19 and choose e = 17. Apply RSA algorithm where message = 5 and find the cipher
text.
a) C = 80 b) C = 92 c) C = 56 d) C = 23
61. The basic idea for the Feistel cipher block is _____
a) Transposition b) Permutation c) Product d) Both a and b
62. The output of the initial permutation in a round on DES for the block 0x 0000 0000 0000 0001
a) 0x 0000 0800 0000 0000 b) 0x 0000 0080 0000 0000
c) 0x 0000 8000 0000 0000 d) 0x 0000 0008 0000 0000
63. The array of S-Boxes in DES convert the block from ____ bit to ____ bit.
a) 48 to 32 b) 32 to 48 c) both a and b d) none of the above
65. Given one S-Box as below, the output of the S-Box for (100111) is:
a) 1111 b) 0001 c) 0010 d) 0100
66. The Decryption of the cipher message khreiaattteacspaiersx using row transposition cipher using the
key (4312567) is
a) pakecarethisisatradex b) takeceapethisisatracez
c) takecarethisisatravex d) takecarethisisatrapex
67. The Decryption of the cipher message Gatlmzclrqtx using Playfair key Matrix with key
(MONARCHY) is
a) Investmentt b) instrumentsz c) Inadjacentsz d) involvements
69. The idea of Block ciphers comes from which stream cipher
a) Polyalphabetic b) Playfair c) One-time pad d) Rail fence
71. If the row (F2 F2 63 26) is the second row from a state in AES algorithm, which is the output from the
shift rows stage in AES encryption
a) 26 F2 F2 63 b) 63 F2 F2 26 c) F2 63 26 F2 d) F2 26 63 F2
79. The number of bits shifted in DES key generation phase for round 4 is
a) One bit b) Two bits c) Three bits d) Four bits
Permutation
S-Box