Visit: The New Homepage

Visit: The New Homepage
Kindly click the image for the updated Notes Online

Thursday, April 3, 2014

Cryptography - MCQs

Posted by Unknown at 11:49 AM
Hits:
MCQs for Cryptography

Topic Outline

  • INTRODUCTION
    • Definitions
    • Two Categories
  • SYMMETRIC-KEY CRYPTOGRAPHY
    • Traditional Ciphers
    • Simple Modem Ciphers
    • Modern Round Ciphers
    • Mode of Operation
  • ASYMMETRIC-KEY CRYPTOGRAPHY
    • RSA
    • Diffie-Hellman

Begin and Good luck!

1.One commonly used public-key cryptography method is the ______ algorithm.

  • A)            RSS
  • B)            RAS
  • C)            RSA
  • D)            RAA

2. A(n) ______ algorithm transforms ciphertext to plaintext.

  • A)            encryption
  • B)            decryption
  • C)            either (a) or (b)
  • D)            neither (a) nor (b)

3. The ________ is the message after transformation.

  • A)            ciphertext
  • B)            plaintext
  • C)            secret-text
  • D)            none of the above

4. A(n) _______ algorithm transforms plaintext to ciphertext.

  • A)            encryption
  • B)            decryption
  • C)            either (a) or (b)
  • D)            neither (a) nor (b)

5. The ________ method provides a one-time session key for two parties.

  • A)            Diffie-Hellman
  • B)            RSA
  • C)            DES
  • D)            AES

6. A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream.

  • A)            S-box
  • B)            P-box
  • C)            T-box
  • D)            none of the above

7. A ________ cipher replaces one character with another character.

  • A)            substitution
  • B)            transposition
  • C)            either (a) or (b)
  • D)            neither (a) nor (b)

8. The ________ cipher reorders the plaintext characters to create a ciphertext.

  • A)            substitution
  • B)            transposition
  • C)            either (a) or (b)
  • D)            neither (a) nor (b)

9. _______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.

  • A)            AEE
  • B)            AED
  • C)            AER
  • D)           AES

10. The ________is the original message before transformation.

  • A)            ciphertext
  • B)            plaintext
  • C)            secret-text
  • D)            none of the above

11. A modern cipher is usually a complex _____cipher made of a combination of different simple ciphers.

  • A)             round
  • B)             circle
  • C)             square
  • D)             none of the above

12. The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.

  • A)             man-in-the-middle
  • B)             ciphertext attack
  • C)             plaintext attack
  • D)             none of the above

13. A combination of an encryption algorithm and a decryption algorithm is called a ________.

  • A)             cipher
  • B)             secret
  • C)             key
  • D)             none of the above

14. In an asymmetric-key cipher, the receiver uses the ______ key.

  • A)             private
  • B)             public
  • C)             either a or b
  • D)             neither (a) nor (b)

15. AES has _____ different configurations.

  • A)             two
  • B)             three
  • C)             four
  • D)             five

16. DES is a(n) ________ method adopted by the U.S. government.

  • A)             symmetric-key
  • B)             asymmetric-key
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

17. DES uses a key generator to generate sixteen _______ round keys.

  • A)             32-bit
  • B)             48-bit
  • C)             54-bit
  • D)             42-bit

18. The Caesar cipher is a _______cipher that has a key of 3.

  • A)             transposition
  • B)             additive
  • C)             shift
  • D)             none of the above

19. ECB and CBC are ________ ciphers.

  • A)             block
  • B)             stream
  • C)             field
  • D)             none of the above

20. A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream.

  • A)             S-box
  • B)             P-box
  • C)             T-box
  • D)             none of the above

21. ________ DES was designed to increase the size of the DES key.

  • A)             Double
  • B)             Triple
  • C)             Quadruple
  • D)             none of the above

22. ________ is the science and art of transforming messages to make them secure and immune to attacks.

  • A)             Cryptography
  • B)             Cryptoanalysis
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

23. DES has an initial and final permutation block and _________ rounds.

  • A)             14
  • B)             15
  • C)             16
  • D)             none of the above

24. The DES function has _______ components.

  • A)             2
  • B)             3
  • C)             4
  • D)             5

25. In a(n) ________ cipher, the same key is used by both the sender and receiver.

  • A)             symmetric-key
  • B)             asymmetric-key
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

26. _________ ciphers can be categorized into two broad categories: monoalphabetic and polyalphabetic.

  • A)             Substitution
  • B)             Transposition
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

27. The _______ cipher is the simplest monoalphabetic cipher. It uses modular arithmetic with a modulus of 26.

  • A)             transposition
  • B)             additive
  • C)             shift
  • D)             none of the above

28. In an asymmetric-key cipher, the sender uses the__________ key.

  • A)             private
  • B)             public
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

29. In a(n) ________ cipher, a pair of keys is used.

  • A)             symmetric-key
  • B)             asymmetric-key
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

30. The _______ is a number or a set of numbers on which the cipher operates.

  • A)             cipher
  • B)             secret
  • C)             key
  • D)             none of the above

31. In a(n) ________, the key is called the secret key.

  • A)             symmetric-key
  • B)             asymmetric-key
  • C)             either (a) or (b)
  • D)             neither (a) nor (b)

Back to Homepage

Note: Check your works. Cryptography - MCQs Answers


credit: Behrouz A. Forouzan©2013 www.FroydWess.com
Share Note :
Welcome to Online-Notes

0 comments: Post Yours! Read Comment Policy ▼
PLEASE NOTE:
I have Zero Tolerance to Spam. It will be deleted immediately upon review.

Post a Comment

 

© 2013 - 2014. All Rights Reserved | Online Notes and Lectures | Customized by MovieOnMovie

Home | | | Top