Sheets Lecture 5
Sheets Lecture 5
Using the following table to answer the question (7 marks) (show your steps):
a b c d e F g h i j k l m N o p q r s t u v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
a- 01011100
b- 11010101
c- 100011013
1. Which of the following refers to the violation of the principle if a computer is no more
accessible?
a. Access control
b. Confidentiality
c. Availability
d. All of the above
2. Which of the following type of text is transformed with the help of a cipher algorithm?
a. Transformed text
b. Complex text
c. Scalar text
d. Plain text
3 In symmetric encryption the sender and receiver must
share the key only, but not the algorithm
4 for cryptographic applications, can use a block cipher to
generate random numbers
5 Asymmetric key schemes is slow compared to symmetric
key schemes
6 In CFB ,electronic codebook main use is sending a few
blocks of data
7 The last block in the CBC mode uses an
Initialization Vector
8 In CTR : the blocks can be processed (encrypted or
decrypted) in parallel
9 Public-Key algorithms rely on one key where it can be
used in both encryption and decryption
10 In CTR: If the same message is encrypted (with the same
key) and sent twice, their ciphertexts are the same
11 the CBC mode, the plaintext block is XORed with
previous ciphertext block before encryption
12 In EBC mode repetitions in plaintext do not show
up in ciphertext
13 The counter value in CTR modes repeats
key/counter values
6- choose the correct answer
1. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the
following is the property of ‘p’ and ‘q’?
a) p and q should be divisible by Ф(n)
b) p and q should be co-prime
c) p and q should be prime
d) p/q should give no remainder
3. For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5
and find the cipher text.
a) C=80
b) C=92
3. In the CIA Triad, which one of the following is not involved?
a. Availability
b. Confidentiality
c. Authenticity
d. Integrity
4. In order to ensure the security of the data/ information, we need to ____________ the data:
a. Encrypt
b. Decrypt
c. Delete
d. None of the above
5- T/F
7. In______ mode, the same plaintext value will always result in the same cipher text
value.
a) Cipher Block Chaining
b) Cipher Feedback
c) Electronic code book
d) Output Feedback