0% found this document useful (0 votes)
63 views2 pages

Crypto

The document contains a series of true/false questions and multiple-choice queries related to cryptography, including concepts like the avalanche effect, AES algorithm steps, and Diffie-Hellman key exchange. It discusses various cryptographic methods, including digital signatures, hashing algorithms, and the properties of different encryption modes. Additionally, it addresses common cryptographic attacks and the importance of message authentication.

Uploaded by

Gurram Anurag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views2 pages

Crypto

The document contains a series of true/false questions and multiple-choice queries related to cryptography, including concepts like the avalanche effect, AES algorithm steps, and Diffie-Hellman key exchange. It discusses various cryptographic methods, including digital signatures, hashing algorithms, and the properties of different encryption modes. Additionally, it addresses common cryptographic attacks and the importance of message authentication.

Uploaded by

Gurram Anurag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

1. The avalanche effect is an undesirable property in cryptographic algorithms.

-
False

2. Which among the following are steps in each round of AES algorithm? - Substitute
Bytes

3. Which of the following is widely used in cryptography to create a trapdoor


function to facilitate exchange of keys? - Factorization

4. The computational complexity of __________ problem is exploited by


Diffie_Hellman algorithm - Discrete Logarithm

5. Which among the following is an active attack? - User Impersonation

6. Diffie-Hellman algorithm is applicable for exchange of keys between two parties


only. - False

7. Digital Signature is implemented using__________ - Public key system

8. In digital cryptography, each character is represented as__________ - 8Bits

9. Select the modes in which computations do not depend on outputs from previous
stages - Electronic Code Book

10. The number of keys used in Triple DES algorithm: 2 or 3-wrong

11. Which among the following is the most resistant to frequency analysis? - Random
polyalphabetic

12. The uses of hashing algorithms include: - All the options

13. Based on the network security protocols, which of the following algorithms are
used to generate message digests? - MD5

14. Which among the following algorithms is designed based on the Feistel Cipher? -
DES

15. In which of the following modes, transmission errors are not propagated? -
Output Feedback Mode

16.The idea behind �confusion� in cryptography is to hide the relationship between


the plaintext and ciphertext.
false

17.Transmission errors are propagated in the following modes, except __________.


Output Feedback Mode

18.Which among the following may be addressed using message authentication?


all

19.Which of the following cryptographic strategies may be used to overcome Man-in-


the-Middle attacks
Encryption

20.The most frequently used alphabets in the English language are _


a,e-wrong

21.The Diffie-Hellman algorithm exploits the computational complexity of the


__________ problem.
Discrete logarithm

21.Which among the following is the most desirable property to enhance the
computational complexity of cryptosystems?
Complexity of the algorithm-wrong, Number of keys-wrong

22.The hash function value used in message authentication is also known as


Message Digest

23.The use of hashing algorithms includes


all

24.What is the size of the hash value produced by the MD5 algorithm
128 bits

25.The cryptographic method that is considered to be genuinely unbreakable is


one time pad

26.The size of the output produced by hash functions is


Fixed based on the hash algorithm

27.X signs a message digitally and sends it to Y. Which of the following is


required for Y to verify the authenticity of the message?
X�s public key

You might also like