0% found this document useful (0 votes)
160 views7 pages

Answer Final 2023

Uploaded by

islamsobhi2019
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
160 views7 pages

Answer Final 2023

Uploaded by

islamsobhi2019
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Answer Final 2023

01. In Symmetric key cryptography, for n users we need _____ number of keys
a) n b) (n-1)/3 c) n(n-1)/2 d) n2

02. Asymmetric key cryptography uses both a public and private key
a) True b) False

03. In Asymmetric key cryptography, for n users we need _____ number of keys
a) n b) (n-1)/3 c) n(n-1)/2 d) n2

04. The most common asymmetric key cryptography is _____


a) RSA b) Elgamal c) Diffie–Hellman d) SHA

05. If Alice and Bob are communicating C-E pub K Alice (M) in a nondefinitional channel, the message being
sent to _____
a) Bob b) Alice c) either Bob or Alice d) none of them

Bob is sending a message to Alice, Where Alice public and private key are K Alice1 and K Alice2
respectively.
06. The cipher generated by Bob is _____
a) C-EK Alice1 (M) b) C-EK Alice2 (M) c) C-DK Alice1 (M) d) C-DK Alice2 (M)

07. Alice can get the original message through _____


a) C-EK Alice1 (M) b) C-EK Alice2 (M) c) C-DK Alice1 (M) d) C-DK Alice2 (M)

08. Secret and private keys are two terms used to refer to the same thing
a) True b) False

09. Private keys can be strings or symbols


a) True b) False

10. Distributing the public key through a public-key distribution channel requires
a) Confidentiality b) Integrity c) Authentication d) b and c

11. Alice needs _____ private key(s) to communicate with n people in the community
a) n(n-1) b) n c) n-1 d) 1

12. All plain text and cipher text in asymmetric encryption treated as _____
a) String b) Integers c) blocks d) decimals

13. Both symmetric and Asymmetric encryption can used exchangeable without any limitations.
a) True b) False

14. Asymmetric key cryptography is faster than symmetric key cryptography


a) True b) False
15. Asymmetric key cryptography is still needed for ______
a) Authentication b) digital signature c) Secret key exchange d) All of the mention

16. The following security mechanism can provide confidentiality, digital signature exchange services
a) Symmetric encryption b) Asymmetric Encryption
c) Advanced encryption standard d) None of the above

17. RSA is a _____ Algorithm


a) Stream b) Block d) a and b d) none of them

18. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the
property of ‘p’ and ‘q’?
a) p and q should be divisible by Φ(n) b) p and q should be co-prime
c) p and q should be prime d) p/q should give no remainder

19. In RSA, Φ(n) = _______ in terms of p and q.


a) (p)/(q) b) (p)(q) c) (p-1)(q-1) d) (p+1)(q+1)

20. In RSA, we select a value ‘e’ such that it lies between 0 and Ф(n) and it is relatively prime to Φ(n).
a) True b) False

21. Which of the following is not of the uses of the Asymmetric key cryptography
a) Cryptography b) Digital Signature c) Key exchange d) Hashing

22. Insertion of messages into the network from a fraudulent source is considered as ……… attack.
a) Disclosure b) Traffic analysis c) Masquerade d) Content modification

23. Release of message contents is considered as _____ attack.


a) Disclosure b) Traffic analysis c) Masquerade d) Content modification

24. Traffic analysis attack can be prevented by providing _____


a) Authentication b) Confidentiality c) Digital signature d) Hash functions

25. Timing modification attack can be prevented by providing _____


a) Authentication b) Confidentiality c) Digital signature d) Hash functions

26. Message Authentication can be ensured through the following mechanisms except _____
a) Symmetric Encryption b) Asymmetric encryption
c) Message authentication code d) Hash functions
27. The following scenario ensures _____
a) Authentication b) Confidentiality c) Integrity d) Both a and b

28. The normal flow of public key encryption provides which of the following?
a) Integrity b) Confidentiality c) Digital signature d) Both b and c

29. The normal flow of public key encryption does not provide authentication since any opponent could
use the _____ to encrypt a message, claiming to be the source.
a) Destination public key b) Destination private key
c) Source public key d) Source private key

30. To provide authentication through public key cryptography the _____


a) Source encrypt the message using the destination public key
b) Source encrypt the message using his private key
c) Source encrypt the message using his public key
d) Public key cryptography could not provide authentication

31. Symmetric encryption fails to ensure authentication in which case of the following?
a) The message is too long b) The message is meaningless bit sequence
c) The message is readable d) None of the above

32. In the external error control, the frame check sequence is calculated _____ Encryption of the message
a) After b) Before c) Simultaneously d) Both a or b

33. Encrypting messages using the source private key provides _____
a) Authentication b) Digital signature c) Confidentiality d) Both a and b

34. An authentication technique involves the use of a secret key to generate a small fixed-size block of
data, appended to the message is known as _____
a) Hash function b) Cryptographic algorithm
c) Frame check sequence d) Message authentication code

35. When public key cryptography is used for ensuring confidentiality and authentication the encryption
algorithm is adopted _____
a) Once b) Twice c) Three times d) Four times
36. Which is much better for encrypting long messages?
a) Symmetric encryption b) Asymmetric encryption
c) Block cipher d) Stream cipher

37. The message authentication code ensures the following except _____
a) Authentication b) Integrity c) Timing and sequence d) Confidentiality

38. Message authentication code is preferred than symmetric encryption while confidentiality is not
required
a) True b) False

39. Message authentication code provides digital signature.


a) True b) False

40. Message authentication code is much slower than encryption.


a) True b) False

41. Message authentication code provides digital signature since both sender and receiver share the same
keys.
a) True b) False

42. Hash functions uses keys as well as message authentication code.


a) True b) False

43. The combination of _____ is like message authentication code


a) hash function and digital signature b) hash function and encryption
c) encryption and digital signature d) none of these

44. Encrypting the hash code with the source private key using a public key cryptography algorithm is
a) Authentication b) Digital signature c) Integrity d) Confidentiality

45. The message authentication code is a _____ function.


a) one-to-one mapping b) many-to-one mapping c) one mapping d) none mentioned

46. Confidentiality can only be provided if we perform message encryption before the MAC generation.
a) True b) False

47. The number of subkeys in DES is ……


a) 18 b) 48 c) 15 d) 16

48. The encrypted message of the following plain text "sun" using Caesar cipher with key = 2
a) NUS b) UWP c) WDP d) QSL

49. The encrypted message of the following plain text "third year" using Playfair with key "fci students"
a) ilnwtpnupz b) ilnwnutppz c) iltpnwnupz d) pziltpnwuz
50. In RSA if n = 187, E = 23, P.T = 26 find p _____, q _____, d _____.
a) 11, 17, 6 b) 17, 6, 11 c) 17, 11, 7 d) 7, 17, 11

51. Use Caesar’s Cipher to decipher the following "HQFUBSWHG WHAW"


a) ABANDONED LOCK b) ENCRYPTED TEXT
c) ABANDONED TEXT d) ENCRYPTED LOCK

52. On Encrypting "thepepsiisintherefrigerator" using Vigenère Cipher System using the keyword
"HUMOR" we get cipher text.
a) abqdnwewuwjphfvrrtrfznsdokvl b) abqdvmwuwjphfvvyyrfznydokvl
c) tbqyrvmwuwjphfvvyyrfznydokvl d) baiuvmwuwjphfoeiyrfznydokvl

53. What will be the encrypted text corresponding to plain text "CLASSIFIED" using Row transposition
cipher with a keyword as "GAMES"?
a) LFDSIASECI b) SECIAISDFL c) CILFAISESD d) LFSECIAISD

54. What will be the plain text corresponding to cipher text “BPKYHFCY” if Playfair cipher is used with
keyword as "SECRET" (assuming j is combined with i)?
a) DOOAR b) WORLD c) DOLLAR d) HELLO

55. What will be the plain text corresponding to cipher text "SCSEMG" if rail fence cipher is used with
key value 2?
a) MSGSEC b) SECMSG c) GSMSEC d) SECGSM

56. If a message (meet me after the toga party) is encrypted using Caesar cipher to be (PHHW PH
DIWHU WKH WRJD SDUWB) then the key used is
a) 2 b) 3 c) 4 d) 5

57. If the plain text "wearediscovered" is encrypted using Vigenère cipher to be

"ZICVTWQNGRZGVTW ", define the key used for encryption

a) deceprive b) dseptive c) decaptve d) deceptive

58. What will be the ciphered text if the string "SANFOUNDRY" is given as input to the code of Vigenère
cipher with keyword as "HELLO"?
a) UEWIIDKLL b) ZEYQCOCM
c) ZEYQCBROCM d) ZEYQCBROCMJDH

59. For p = 11 and q = 19 and choose e = 17. Apply RSA algorithm where message = 5 and find the cipher
text.
a) C = 80 b) C = 92 c) C = 56 d) C = 23

60. Given n = 35, e = 5; C = 10. What is the plaintext (use RSA)?


a) 3 b) 7 c) 8 d) 5

61. The basic idea for the Feistel cipher block is _____
a) Transposition b) Permutation c) Product d) Both a and b

62. The output of the initial permutation in a round on DES for the block 0x 0000 0000 0000 0001
a) 0x 0000 0800 0000 0000 b) 0x 0000 0080 0000 0000
c) 0x 0000 8000 0000 0000 d) 0x 0000 0008 0000 0000

63. The array of S-Boxes in DES convert the block from ____ bit to ____ bit.
a) 48 to 32 b) 32 to 48 c) both a and b d) none of the above

64. DES has _____ S-Box in each round.


a) 8 b) 6 c) 2 d) 4

65. Given one S-Box as below, the output of the S-Box for (100111) is:
a) 1111 b) 0001 c) 0010 d) 0100

66. The Decryption of the cipher message khreiaattteacspaiersx using row transposition cipher using the
key (4312567) is
a) pakecarethisisatradex b) takeceapethisisatracez
c) takecarethisisatravex d) takecarethisisatrapex

67. The Decryption of the cipher message Gatlmzclrqtx using Playfair key Matrix with key
(MONARCHY) is
a) Investmentt b) instrumentsz c) Inadjacentsz d) involvements

68. Given the plain message ifwewishtoreplaceletters and cipher message


WIRFRWAJUHYFTSDVFSFUUFYA, we can deduce that the encryption algorithm used is
a) Playfair b) Caesar c) Monoalphabetic d) Rail fence

69. The idea of Block ciphers comes from which stream cipher
a) Polyalphabetic b) Playfair c) One-time pad d) Rail fence

70. All AES stages are substitution except the following


a) Subbyte b) Shiftrows c) Mixcolumns d) Adding Keys

71. If the row (F2 F2 63 26) is the second row from a state in AES algorithm, which is the output from the
shift rows stage in AES encryption
a) 26 F2 F2 63 b) 63 F2 F2 26 c) F2 63 26 F2 d) F2 26 63 F2

72. The key generation stage in DES changes key from


a) 128 to 56 b) 56 to 48 c) 48 to 32 d) 56 to 64

73. The basic round in AES contains mainly _____ operations


a) Three b) Four c) Five d) None

74. The missed transformation from the last round in AES is


a) Subbyte b) Shiftrows c) Mixcolumns d) Add-roundkeys

75. The transformation performed separately in the pre-round in AES is


a) Subbyte b) Shiftrows c) Mixcolumns d) Add-roundkeys

76. The key words used in round two in AES


a) w0w1w2w3 b) w4w5w6w7 c) w8w9w10w11 d) none of the above

77. W6 from the key in AES comes from


a) w0+w6 b) w1+w4 c) w2+w5 d) w3+w3

78. The step responsible for diffusion in AES is


a) Subbyte b) Shiftrows c) Mixcolumns d) Adding Keys

79. The number of bits shifted in DES key generation phase for round 4 is
a) One bit b) Two bits c) Three bits d) Four bits

80. The idea of block cipher algorithm comes from _____


a) long data chunks b) Long keys c) Product ciphers d) Reversible mapping

Permutation

S-Box

You might also like