0% found this document useful (0 votes)
5 views4 pages

Sheets Lecture 5

The document discusses various concepts in cryptography, including symmetric and asymmetric encryption, modes of operation like CBC and CTR, and the RSA algorithm. It includes multiple-choice questions related to these topics, testing knowledge on properties of keys, encryption methods, and the CIA Triad. Additionally, it covers practical applications such as Caesar cipher encryption and decryption.

Uploaded by

alishaaban.bany
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

Sheets Lecture 5

The document discusses various concepts in cryptography, including symmetric and asymmetric encryption, modes of operation like CBC and CTR, and the RSA algorithm. It includes multiple-choice questions related to these topics, testing knowledge on properties of keys, encryption methods, and the CIA Triad. Additionally, it covers practical applications such as Caesar cipher encryption and decryption.

Uploaded by

alishaaban.bany
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

3 In symmetric encryption the sender and receiver must

share the key only, but not the algorithm


4 for cryptographic applications, can use a block cipher to
generate random numbers
5 Asymmetric key schemes is slow compared to symmetric
key schemes
6 In CFB ,electronic codebook main use is sending a few
blocks of data
7 The last block in the CBC mode uses an
Initialization Vector
8 In CTR : the blocks can be processed (encrypted or
decrypted) in parallel
9 Public-Key algorithms rely on one key where it can be
used in both encryption and decryption
10 In CTR: If the same message is encrypted (with the same
key) and sent twice, their ciphertexts are the same
11 the CBC mode, the plaintext block is XORed with
previous ciphertext block before encryption
12 In EBC mode repetitions in plaintext do not show
up in ciphertext
13 The counter value in CTR modes repeats
key/counter values
6- choose the correct answer

1. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the
following is the property of ‘p’ and ‘q’?
a) p and q should be divisible by Ф(n)
b) p and q should be co-prime
c) p and q should be prime
d) p/q should give no remainder

2. In RSA, Ф(n) = _______ in terms of p and q.


a) (p)/(q)
b) (p)(q)
c) (p-1)(q-1)
d) (p+1)(q+1)

3. For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5
and find the cipher text.
a) C=80
b) C=92
3. In the CIA Triad, which one of the following is not involved?

a. Availability
b. Confidentiality
c. Authenticity
d. Integrity

4. In order to ensure the security of the data/ information, we need to ____________ the data:

a. Encrypt
b. Decrypt
c. Delete
d. None of the above

5. The art of breaking ciphers is known as:


a. cryptology
b. cryptography
c. cryptanalysis
d. crypting

6. Number of S - boxes used in DES algorithm is ...............


a. 4
b. 8
c. 16
d. 32
7. ............... is an example for public key algorithm.
a. RSA
b. DES
c. AES
d. SHA-256

5- T/F

No Statements T/F Correct


1 In Cipher Block Chain each block is encoded
independently of the other blocks
c) C=56
d) C=23

4. Which of the following modes of operation does not involve feedback?


a) ECB
b) CBC
c) CTR
d) OFB

5. Which of the following modes does not implement chaining or “dependency on


previous stage computations”?
a) CTR, ECB
b) CTR, CFB
c) CFB, OFB
d) ECB, OFB

6. RSA_____ be used for digital signature.


a) Must no
b) Cannot
c) Can
d) Should not

7. In______ mode, the same plaintext value will always result in the same cipher text
value.
a) Cipher Block Chaining
b) Cipher Feedback
c) Electronic code book
d) Output Feedback
1. Using the following table to answer the question (7 marks) (show your steps):

a b c d e F g h i j k l m N o p q r s t u v w x y z

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

a- Decrypt the following statements using Ceaser (3 marks)


Cipher text : “vwab it oqi” with Key = 8
b- Encrypt the following statement using Ceaser : “welcome to our faculty”

2- Encrypt the statement : “ faculty of graduation study “ using rail fence .

3- assume a permutation table with 8 cells as following :


2 6 3 1 4 8 5 7
Permutate the following binary code:

a- 01011100
b- 11010101
c- 100011013

4- choose the correct answer

1. Which of the following refers to the violation of the principle if a computer is no more
accessible?

a. Access control
b. Confidentiality
c. Availability
d. All of the above

2. Which of the following type of text is transformed with the help of a cipher algorithm?

a. Transformed text
b. Complex text
c. Scalar text
d. Plain text

You might also like