0% found this document useful (0 votes)
38 views3 pages

Short Question 2

The document contains a set of questions and answers related to cryptography, including multiple-choice questions and fill-in-the-blank items. Key topics covered include types of cryptographic algorithms, principles of cryptography, and specific terms such as AES and RSA. The answers provided indicate the correct options for each question, along with definitions and explanations of cryptographic concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views3 pages

Short Question 2

The document contains a set of questions and answers related to cryptography, including multiple-choice questions and fill-in-the-blank items. Key topics covered include types of cryptographic algorithms, principles of cryptography, and specific terms such as AES and RSA. The answers provided indicate the correct options for each question, along with definitions and explanations of cryptographic concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

SET 2

1.Choose the correct alternative:


S.NO

1 Which of the following stage of cryptography are the readable non-


encrypted data?

(a) Plain text (b) encryption (c) cipher text (d) decryption

2 Which of the following is the meaning of crypt?

(a) hidden (b) writing (c) copied d) both a & b

3 Which of the following are the applications of cryptography?

(a) Digital signature (b) authentication (c) Key generation (d) All

4 Which of the following principle of cryptography explains transmitted


data in cannot be modified?

(a)privacy (b)Reliability (c)non-Repudiation (d)Authenticatio


n

5 Which of the following algorithm is also known as message Digest

(a) SHA Algorithm (b) MD5 algorithm (c) Whirlpool (d) All of above

6 Which of the following are symmetric based algorithims?

(a) block (b) block cipher (c) blowfish (d) all of these

7 On which of the following term does AES performs computation?

(a) bits (b) block (c) binary d) Bytes

8 Block type cipher operates on ____ length of groups?

(a) constant (b) zero c) fixed (d) none

9 Which of the following crypto algo exchanges keys over public channel
securely?

a) Deffie-helman b)RSA c) AES d)Advance AES

10 Which one is the strong attack mechanism?


(a) chosen (b) chosen (c) brute force (d) man in the
plaintext ciphertext attack attack middle attack
attack

Fill in the Blanks: 5 Marks

S.NO

1 A process of making the encrypted text readable again is


called_________

2 Cryptography intercepts ____ type of data accessibility?

3 An AES algo has _____ type pf block cipher?

4 ___ is defined as a pair of algorithm which performs both encryption


and decryption?

5 No. Of rounds in DES algorithm are ____________________.

6 In ____________attack the attacker can modify the messages.

7 AES stand for ____________

8 Caeser cipher is a ____________ technique.

9 we use pair of key in an ____________ key cryptograpy.

10 RSA stands for ________________________

SET-2

Multiple choice
1) A
2) D
3) D
4) B
5) A
6) D
7) D
8) C
9) A
10) C

Fill in the blanks

1) Decryption
2) unauthorised
3) Symmetric
4) Cipher
5) 16
6) Active attack
7) Advance encryption standard
8) Substition technique
9) Asymmetric key
10) Rivest Shamir Aldeman

You might also like