0% found this document useful (0 votes)
7 views4 pages

Sheets Lecture 5

The document contains a series of questions related to cryptography, including tasks for decrypting and encrypting messages using Caesar and rail fence ciphers, as well as questions about symmetric and asymmetric encryption principles. It also includes multiple-choice questions about the RSA algorithm, the CIA triad, and various modes of operation in cryptography. Additionally, there are true/false statements regarding cipher operations and their characteristics.

Uploaded by

alishaaban.bany
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views4 pages

Sheets Lecture 5

The document contains a series of questions related to cryptography, including tasks for decrypting and encrypting messages using Caesar and rail fence ciphers, as well as questions about symmetric and asymmetric encryption principles. It also includes multiple-choice questions about the RSA algorithm, the CIA triad, and various modes of operation in cryptography. Additionally, there are true/false statements regarding cipher operations and their characteristics.

Uploaded by

alishaaban.bany
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1.

Using the following table to answer the question (7 marks) (show your steps):

a b c d e F g h i j k l m N o p q r s t u v w x y z

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

a- Decrypt the following statements using Ceaser (3 marks)


Cipher text : “vwab it oqi” with Key = 8
b- Encrypt the following statement using Ceaser : “welcome to our faculty”

2- Encrypt the statement : “ faculty of graduation study “ using rail fence .

3- assume a permutation table with 8 cells as following :


2 6 3 1 4 8 5 7
Permutate the following binary code:

a- 01011100
b- 11010101
c- 100011013

4- choose the correct answer

1. Which of the following refers to the violation of the principle if a computer is no more
accessible?

a. Access control
b. Confidentiality
c. Availability
d. All of the above

2. Which of the following type of text is transformed with the help of a cipher algorithm?

a. Transformed text
b. Complex text
c. Scalar text
d. Plain text
3 In symmetric encryption the sender and receiver must
share the key only, but not the algorithm
4 for cryptographic applications, can use a block cipher to
generate random numbers
5 Asymmetric key schemes is slow compared to symmetric
key schemes
6 In CFB ,electronic codebook main use is sending a few
blocks of data
7 The last block in the CBC mode uses an
Initialization Vector
8 In CTR : the blocks can be processed (encrypted or
decrypted) in parallel
9 Public-Key algorithms rely on one key where it can be
used in both encryption and decryption
10 In CTR: If the same message is encrypted (with the same
key) and sent twice, their ciphertexts are the same
11 the CBC mode, the plaintext block is XORed with
previous ciphertext block before encryption
12 In EBC mode repetitions in plaintext do not show
up in ciphertext
13 The counter value in CTR modes repeats
key/counter values
6- choose the correct answer

1. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the
following is the property of ‘p’ and ‘q’?
a) p and q should be divisible by Ф(n)
b) p and q should be co-prime
c) p and q should be prime
d) p/q should give no remainder

2. In RSA, Ф(n) = _______ in terms of p and q.


a) (p)/(q)
b) (p)(q)
c) (p-1)(q-1)
d) (p+1)(q+1)

3. For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5
and find the cipher text.
a) C=80
b) C=92
3. In the CIA Triad, which one of the following is not involved?

a. Availability
b. Confidentiality
c. Authenticity
d. Integrity

4. In order to ensure the security of the data/ information, we need to ____________ the data:

a. Encrypt
b. Decrypt
c. Delete
d. None of the above

5. The art of breaking ciphers is known as:


a. cryptology
b. cryptography
c. cryptanalysis
d. crypting

6. Number of S - boxes used in DES algorithm is ...............


a. 4
b. 8
c. 16
d. 32
7. ............... is an example for public key algorithm.
a. RSA
b. DES
c. AES
d. SHA-256

5- T/F

No Statements T/F Correct


1 In Cipher Block Chain each block is encoded
independently of the other blocks
c) C=56
d) C=23

4. Which of the following modes of operation does not involve feedback?


a) ECB
b) CBC
c) CTR
d) OFB

5. Which of the following modes does not implement chaining or “dependency on


previous stage computations”?
a) CTR, ECB
b) CTR, CFB
c) CFB, OFB
d) ECB, OFB

6. RSA_____ be used for digital signature.


a) Must no
b) Cannot
c) Can
d) Should not

7. In______ mode, the same plaintext value will always result in the same cipher text
value.
a) Cipher Block Chaining
b) Cipher Feedback
c) Electronic code book
d) Output Feedback

You might also like