0% found this document useful (0 votes)
178 views4 pages

Important Questions For DES

Uploaded by

kareemtamer13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
178 views4 pages

Important Questions For DES

Uploaded by

kareemtamer13
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Important questions for DES/3-DES - AES algorithms:

1.AES uses a ____________ bit block size and a key size of __________ bits.
a) 128; 128 or 256
b) 64; 128 or 192
c) 256; 128, 192, or 256
d) 128; 128, 192, or 256
2. Like DES, AES also uses Feistel Structure.
a) True
b) False

3. Which one of the following is not a cryptographic algorithm- JUPITER,


Blowfish, RC6, Rijndael and Serpent?
a) JUPITER
b) Blowfish
c) Serpent
d) Rijndael

4. Which algorithm among – MARS, Blowfish, RC6, Rijndael and Serpent – was
chosen as the AES algorithm?
a) MARS
b) Blowfish
c) RC6
d) Rijndael

5. How many rounds does the AES-192 perform?


a) 10
b) 12
c) 14
d) 16

6. How many rounds does the AES-256 perform?


a) 10
b) 12
c) 14
d) 16

7. What is the expanded key size of AES-192?


a) 44 words  Number of words = (Number of Rounds + 1) * 4
b) 60 words
c) 52 words
d) 36 words

8. The 4×4 byte matrices in the AES algorithm are called


a) States
b) Words
c) Transitions
d) Permutations
9. In AES the 4×4 bytes matrix key is transformed into a keys of size
__________
a) 32 words
b) 64 words
c) 54 words
d) 44 words

10. For the AES-128 algorithm there are __________ similar rounds and
_________ round is different.
a) 2 pair of 5 similar rounds; every alternate
b) 9 ; the last
c) 8 ; the first and last
d) 10 ; no

11. Which of the 4 operations are false for each round in the AES algorithm
i) Substitute Bytes
ii) Shift Columns  Shift Rows
iii) Mix Rows  Mix columns
iv) XOR Round Key  Addition of round keys

a) i) only
b) ii) iii) and iv)
c) ii) and iii)
d) only iv)

12. There is an addition of round key before the start of the AES round
algorithms.
a) True
b) False

13. On comparing AES with DES, which of the following functions from
DES does not have an equivalent AES function?
a) f function
b) permutation p
c) swapping of halves  only in DES because it’s a Feistel Network
d) XOR of subkey with function f

9. How many round keys are generated in the AES algorithm?


a) 11  10 round keys + 1 round key in the start of AES round Algorithm
b) 10
c) 8
d) 12

10. Which function can be used in AES multiplication


a) m(x)=x7+x4+x3
b) m(x)=x8+x4+x3+x+1  GF(2^8)
c) m(x)=x8+x3+x2+x+1
d) m(x)=x8+x5+x3+x
11. DES follows
a) Hash Algorithm
b) Caesars Cipher
c) Feistel Cipher Structure
d) SP Networks

12. The DES Algorithm Cipher System consists of ____________rounds


(iterations) each with a round key
a) 12
b) 18
c) 9
d) 16

13. The DES algorithm has a key length of


a) 128 Bits
b) 32 Bits
c) 64 Bits
d) 16 Bits

14. In the DES algorithm, although the key size is 64 bits only 48bits are
used for the encryption procedure, the rest are parity bits.
a) True
b) False

15. In the DES algorithm the round key is __________ bit and the Round
Input is ____________bits.
a) 48, 32
b) 64,32
c) 56, 24
d) 32, 32

16. In the DES algorithm the Round Input is 32 bits, which is expanded to
48 bits via ____________
a) Scaling of the existing bits
b) Duplication of the existing bits
c) Addition of zeros
d) Addition of ones

17. The Initial Permutation table/matrix is of size


a) 16×8
b) 12×8
c) 8×8  to permute 64 bits u need 8x8 matrix
d) 4×8

18. The number of unique substitution boxes in DES after the 48 bit XOR
operation are
a) 8
b) 4
c) 6
d) 12

19. In the DES algorithm the 64 bit key input is shortened to 56 bits by
ignoring every 4th bit.
a) True
b) False  every 8th bit is ignored

20. A preferable cryptographic algorithm should have a good avalanche


effect.
a) True
b) False

21. How many keys does the Triple DES algorithm use?
a) 2
b) 3
c) 2 or 3  Variant 1 has 3 keys, Variant 2 has 2 keys
d) 3 or 4

You might also like