Sheets Lecture 5
Sheets Lecture 5
1. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the
following is the property of ‘p’ and ‘q’?
a) p and q should be divisible by Ф(n)
b) p and q should be co-prime
c) p and q should be prime
d) p/q should give no remainder
3. For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5
and find the cipher text.
a) C=80
b) C=92
3. In the CIA Triad, which one of the following is not involved?
a. Availability
b. Confidentiality
c. Authenticity
d. Integrity
4. In order to ensure the security of the data/ information, we need to ____________ the data:
a. Encrypt
b. Decrypt
c. Delete
d. None of the above
5- T/F
7. In______ mode, the same plaintext value will always result in the same cipher text
value.
a) Cipher Block Chaining
b) Cipher Feedback
c) Electronic code book
d) Output Feedback
1. Using the following table to answer the question (7 marks) (show your steps):
a b c d e F g h i j k l m N o p q r s t u v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
a- 01011100
b- 11010101
c- 100011013
1. Which of the following refers to the violation of the principle if a computer is no more
accessible?
a. Access control
b. Confidentiality
c. Availability
d. All of the above
2. Which of the following type of text is transformed with the help of a cipher algorithm?
a. Transformed text
b. Complex text
c. Scalar text
d. Plain text