Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Computer Sci - WPS Offic

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 39

IncludeHelp

Home » Cryptography » Cryptography MCQs

MCQ | Cryptography Ciphers (Level: Easy)

Here, we have a set of multiple-choice questions and answers (quiz) on ciphers in Cryptography (basic
concepts of Cryptography Techniques and different types of ciphers).

Submitted by Monika Sharma, on February 02, 2020

1) We are provided the plain text “SUN”. You need to convert the given plain text into ciphertext under
the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the
given text if the key is 2?

UWP

NUS

WUP

QSL

Answer: a) UWP

Explanation:

In the Caesar cipher technique, the encryption is performed as follows,

E ( P , K ) = ( P + K ) mod 26

Therefore,

E ( S , 2 ) = ( 18 + 2 ) mod 26 = 20 = U

E ( U , 2 ) = ( 20 + 2 ) mod 26 = 22 = W

E ( N , 2 ) = ( 13 + 2 ) mod 26 = 15 = P
Hence, the ciphertext is "UWP".

2) Which of the following cannot be chosen as a key in the Caesar cipher?

An integer

An alphabet (A-Z or a-z)

A string

None of the above

Answer: c) A string

Explanation:

In Caesar cipher, we can choose a number or a character which when performed addition modulo
operation with the given letters of the plain text gives us ciphertext. However, a string cannot be chosen
for encryption in this case.

3) Which of the following cipher techniques include the involvement of matrix operations in their
algorithms of encryption and decryption?

Hill Cipher

Playfair cipher

Both a and b

None of the above

Answer: c) Both a and b

Explanation:
The hill cipher includes a square matrix as the key, and in Playfair cipher, we create a 5X5 matrix using
the given key string. Hence, both these ciphers include the use of matrices.

4) Which of the following ciphers is a block cipher?

Caesar cipher

Vernam cipher

Playfair cipher

None of the above

Answer: c) Playfair cipher

Explanation:

The Playfair cipher uses a block of plain text, each block containing 2 characters.

5) Which of the following ciphers uses asymmetric key cryptography?

Rail Fence Cipher

Data Encryption Standard (DES)

Diffie Hellman Cipher

None of the above

Answer: c) Diffie Hellman Cipher

Explanation:
The Diffie Hellman cipher uses asymmetric key cryptography. It uses a pair of keys, one private and one
public.

6) "Cipher" is synonymous with "code",

True

False

Answer: a) True

Explanation:

In cryptography, the terms "cypher" and "code" are synonymous since they both refer to a sequence of
processes that encrypt a message; nonetheless, the ideas are separate in cryptography, particularly
classical cryptography.

7) Block ciphers accumulate symbols in a message of a ______.

Fixed size

Variable

Integration

All of the mentioned above

Answer: a) Fixed size

Explanation:

Block cyphers amass symbols in a message of a fixed size (the block), whereas stream cyphers operate
on a stream of symbols that is constantly changing. When a cypher employs the same key for both
encryption and decryption, the algorithm or cypher is referred to as a symmetric key algorithm.
Asymmetric key algorithms, also known as cyphers, encrypt and decrypt data using a different key for
each operation.

8) With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.

Different

Same

Both A and B

None of the mentioned above

Answer: b) Same

Explanation:

When using symmetric key techniques, the same key is utilized for both the encryption and decryption
of the information being transmitted. Asymmetric key algorithms, which encrypt and decrypt data using
public and private keys, are used to protect sensitive information.

9) ____ is the message or data that can be readable by the sender.

Edited

Main Text

Plain text

All of the mentioned above

Answer: c) Plain text

Explanation:
Plain text is a message or data that may be read by the sender, the receiver, or any third party who
happens to come across it. When plain text is altered by the application of certain algorithms or
procedures, the resulting data or message is referred to as ciphertext.

10) In the case of symmetric key encryption, the secret key that both the parties possess can be
anything such as a _______.

Passcode or a password

Developed code

Network set

None of the mentioned above

Answer: a) Passcode or a password

Explanation:

With symmetric key encryption, the secret key that both parties have access to can be anything, such as
a passcode or a password, depending on the circumstances. Also, a random string of characters or
numbers generated using a secure Random Number Generator (RNG) can be used to represent it.

IncludeHelp

Home » Cryptography » Cryptography MCQs

MCQ | Cryptography Basics

Here, we have a set of multiple-choice questions and answers (quiz) on cryptography basics (basic
concepts of cryptography techniques).

Submitted by Monika Sharma, on February 02, 2020

1) Which of the following is not a type of symmetric-key cryptography technique?


Caesar cipher

Data Encryption Standard (DES)

Diffie Hellman cipher

Playfair cipher

Answer: c) Diffie Hellman cipher

Explanation:

The Diffie Hellman uses a pair of asymmetric keys for encryption and decryption processes. All the rest
mentioned cipher techniques use the same key for encryption as well as decryption.

2) Which of the following is not a principle of data security?

Data Confidentiality

Data Integrity

Authentication

None of the above

Answer: d) None of the above

Explanation:

All the first three options are the principles of data security. None of the mentioned characteristics fall
apart form these principles. Therefore, the correct answer is none of the above.

3) Which of the following security attacks is not an active attack?


OR

Which of the following attacks is a passive attack?

Masquerade

Modification of message

Denial of service

Traffic analysis

Answer: d) Traffic analysis

Explanation:

In a passive attack, the attacker does not modify any part of the data. His attempt is only to obtain the
information and not to modify it. From the mentioned options, this happens only in Traffic analysis in
which the attacker monitors the pattern of transmission. The rest other options are examples of active
attacks.

4) Which of the following options correctly defines the Brute force attack?

Brutally forcing the user to share the useful information like pins and passwords.

Trying every possible key to decrypt the message.

One entity pretends to be some other entity

The message or information is modified before sending it to the receiver.

Answer: b) Trying every possible key to decrypt the message.

Explanation:

Only option b) is the correct definition for brute force attack.


5) "A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext."
Which of the following is capable of becoming a key in a cryptographic algorithm?

An integer values

A square matrix

An array of characters (i.e. a string)

All of the above

Answer: d) All of the above

Explanation:

As the key can be any string of bits, all the mentioned options are capable of becoming a key in a
cryptographic algorithm.

ADVERTISEMENT

6) A mechanism used to encrypt and decrypt data.

Cryptography

Algorithm

Data flow

None of these

Answer: a) Cryptography
Explanation:

Cryptography is a mechanism used to encrypt and decrypt data.

7) To encrypt the plaintext, a cryptographic algorithm works in combination with a key...

Word, number, or phrase

Special Symbols

Function Keys

All of these

Answer: a) word, number and phrase

Explanation:

Word, number and phrase are used to encrypt the plaintext.

8) The plaintext encrypts to different cipher text with different keys

True

False

Answer: a) True

Explanation:

The plaintext is used to encrypt to different cipher text with different keys.
9) Conventional cryptography also known as ... encryption.

asymmetric-key

logical-key

symmetric-key

None of these

Answer: c) symmetric-key

Explanation:

Conventional cryptography also known as symmetric-key encryption.

10) The Data Encryption Standard (DES) is an example of a ...

Conventional cryptosystem

Asymmetric cryptosystem

Caesar's cryptosystem

All of these

ADVERTISEMENT

Answer: a) Conventional cryptosystem

11) Public key cryptography is a ... cryptosystem


Symmetric

Asymmetric

Symmetric & Asymmetric both

None of these

Answer: b) Asymmetric cryptosystem

Explanation:

Asymmetric is a public key cryptography.

12) Security Goals of Cryptography are

Confidentiality

Authenticityn

Data integrityn

Non-repudiation

All of these

Answer: e) All of these

Explanation:

Confidentiality, authenticity, data integrity and non-repudiation security are the key goals of
cryptography.

13) A process of studying cryptographic system is known as Cryptanalysis


True

False

Answer: a) True

Explanation:

Cryptanalysis is a process of studying cryptographic system.

14) Cipher in cryptography is –

Encrypted message

Algorithm for performing encryption and decryption

Both algorithm for performing encryption and decryption and encrypted message

Decrypted message

Answer: b) algorithm for performing encryption and decryption

Explanation:

Cipher in cryptography is an Algorithm for performing encryption and decryption.

15) The private key in asymmetric key cryptography is kept by

Sender

Receiver

Sender and receiver


All the connected devices to the network

ADVERTISEMENT

Answer: b) Receiver

Explanation:

The private key is kept by the receiver.

16) Which one of the following algorithms is not used in asymmetric-key cryptography?

DSA algorithm

Electronic code book algorithm

Diffie-Hellman algorithm

RSA algorithm

Answer: b) Electronic code book algorithm

Explanation:

The electronic code book algorithm is a block cypher method in which a block of data corresponds to
each block of text in the encrypted message.

17) Which is the cryptographic protocol that is used to protect an HTTP connection?

Resource reservation protocol

SCTP
TLS

ECN

Answer: c) TLS (Transport Layer Security)

Explanation:

In order to prevent eavesdropping, tampering and message forgery, TLS has strong message
authentication and key-material generation.

18) A key is a value that works with a cryptographic algorithm to produce a specific cipher text.

True

False

Answer: a) True

Explanation:

A key is a value that works with a cryptographic algorithm to produce a specific cipher text.

19) A Public key size and conventional cryptography’s secret key size are closely related with one
another.

True

False

Answer: b) False
Explanation:

A Public key size and conventional cryptography’s secret key size are unrelated with one another.

20) ElGamal encryption system is an asymmetric key encryption algorithm.

Public-key cryptography

Private-key cryptography

Both

None of these

Answer: a) Public-key cryptography

Explanation:

The ElGamal encryption scheme in cryptography is an asymmetrical key encryption algorithm based on
the Diffie-Hellman key exchange for public-key cryptography.

IncludeHelp

Home » Cryptography » Cryptography MCQs

MCQ | Cryptography Ciphers (Level: Easy) | Set 2

Here, we have a set of multiple-choice questions and answers (quiz) on ciphers in Cryptography (basic
concepts of Cryptography Techniques and different types of ciphers).

Submitted by Monika Sharma, on February 02, 2020

1) You are supposed to use hill cipher for encryption technique. You are provided with the following
matrix,
A = [ 4 2

2 1]

Is the given matrix 'A', a valid key to be used for encryption?

Yes

No

Can't be determined

Data insufficient

Answer: b) No

Explanation:

For choosing any square matrix as a key, it should be taken care that the matrix is invertible, i.e. its
inverse must exist. Here, in this case,

|A|=0

Therefore, it means that 'A' is not an invertible matrix. Hence matrix 'A' cannot be chosen as a key
matrix for encryption in the Hill cipher.

2) The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following
properties are not shown by the fiestal structure?

The input text is divided into two parts: one being left half and another one being right half.

Swapping of the left and right halves are performed after each round.

The plain text is converted into a matrix form first

None of the above


Answer: c) The plain text is converted into a matrix form first

Explanation:

The fiestal structure does not require the conversion of the plain text into matrix form at any of its
steps.

3) Among the following given options, chose the strongest encryption technique?

DES ( Data Encryption Standard)

Double DES

Triple DES

AES (Advance Encryption Standard)

Answer: d) AES (Advance Encryption Standard)

Explanation:

It has been proved that the AES performs much better than the all the other DES, whether it be single
DES or series of DES.

4) What is the full-form of RSA in the RSA encryption technique?

Round Security Algorithm

Rivest, Shamir, Adleman

Robert, Shamir, Addie

None of the above


Answer: b) Rivest, Shamir, Adleman

Explanation:

The RSA algorithm was named after the three scientists who developed this technique and the name
RSA is itself the abbreviation of their names: Rivest, Shamir, and Adleman.

5) Consider the following steps,

Substitution bytes

Shift Rows

Mix columns

Add round key

The above steps are performed in each round of which of the following ciphers?

Rail fence cipher

Data Encryption Standard (DES)

Advance Encryption Standard (AES)

None of the above

Answer: c) Advance Encryption Standard (AES)

Explanation:

Each round of AES includes the mentioned steps.

6) Codes and ciphers are different ways to _____ a message.


Encrypt

Decrypt

Both A and B

All of the mentioned above

Answer: c) Both A and B

Explanation:

Codes and cyphers are two separate methods of encrypting and decrypting messages. Using a code, you
may make any message more or less meaningful by substituting each word with another that has a
different meaning.

7) _____ ciphers encrypt uniformly sized blocks of data.

Set

Block

Rack

All of the mentioned above

Answer: b) Block

Explanation:

Block cyphers are used to encrypt data in blocks of consistent size. A block cypher takes a block of
plaintext bits and generates a block of ciphertext bits, which are typically the same size as the plaintext
blocks they are given. In the given system, the size of the block is fixed at a certain size.
8) Images can also be encrypted in sentences,

True

False

Answer: A) True

Explanation:

Images can also be encoded in the form of phrases. Steganography is the term used to describe this.
Steganography is a type of encryption procedure in which you write one thing but truly mean something
completely different when you read it.

9) Decryption is a process to unveil the ______.

Unsecured data

Secured data

Insecure

None of the mentioned above

Answer: b) Secured data

Explanation:

Decryption is a process to unveil the secured data, and for it, the structure obtains and transforms the
mixed-up data and modifies it into an accessible language and image for both the reader along the
system.

10) Symmetric encryption gathers plain-text data and then shuffles it to make it unreadable.
True

False

Answer: a) True

Explanation:

Simple text data is collected and then shuffled in order to render it unreadable using symmetric
encryption. And, just before it reaches the intended.

IncludeHelp

Home » Cryptography » Cryptography MCQs

MCQ | Cryptography Hash Functions (Level: Easy)

Here, we have a set of multiple-choice questions and answers (quiz) on hash functions in Cryptography
(basic concepts of Cryptography Hash Functions).

Submitted by Monika Sharma, on February 10, 2020

1) Which of the following is /are offered by the Hash functions?

Authentication

Non repudiation

Data Integrity

All of the above

Answer: d. All of the above

Explanation:
The Hash functions offer all the mentioned properties in a data compression: i.e. authentication, Non
repudiation and Data Integrity.

2) Which of the following is not a property of Hash Function?

Pre-Image Resistance

Compression

Fixed Length Output

None of the above

Answer: d. None of the above

Explanation:

All the first three options are the properties of the Hash function. None of the mentioned characteristic
fall apart form them. Therefore, the correct answer is none of the above.

3) Which of the following security services cannot be achieved using the Hash functions?

OR

Which of the following is not possible through hash value?

Password Check

Data Integrity check

Digital Signatures

Data retrieval in its original form

Answer: d. Data retrieval in its original form


Explanation:

As the hash functions are irreversible and has pre-image resistance property, therefore it is almost
impossible to obtain the original data form its hash value. Therefore, it is not possible to retrieve data in
its original form from its hash value.

4) Which of the following options is not correct according to the definition of the Hash Function?

Hash Functions are mathematical functions

They compress the input values

The hash functions work on arbitrary length input but produces fixed length output.

None of the above

Answer: d. None of the above

Explanation:

All the first three options obey to the definition of the Hash function. None of the mentioned options fall
apart form it. Therefore, the correct answer is none of the above.

5) "The Hash Function takes an input of arbitrary length and converts it into a fixed length output."

Which of the following names can we use for denoting the output of the hash function?

Hash value

Hash Code

Message Digest

All of the above

Answer: d. All of the above


Explanation:

All the mentioned names can be used to denote the output of a hash function. Therefore, the correct
answer is d. All of the above.

6) A cryptographic hash function is an equation used to verify the ____ of data.

Variety

Validity

Veracity

None of the mentioned above

Answer: b. Validity

Explanation:

A cryptographic hash function verifies the validity of data. It has several uses, including information
security (e.g., user authentication).

7) Hash functions are mathematical functions that transform or "map" a given set of data into a bit
string of fixed size, also known as the hash value.

Hash value

Map value

Both A and B

None of the mentioned above

Answer: a. Hash value


Explanation:

Hash functions are mathematical functions that transform or "map" a given collection of data into a bit
string of defined length, which is referred to as the hash value. Hash functions are used in cryptography.
A hash value is the result of converting plaintext or ciphertext to hash value. Any kind of data can be
transformed into a particular text string using hashing, which is a cryptographic approach.

8) Hash functions are used in ___ and have variable levels of complexity and difficulty.

System approach

Cyber safe

Cryptography

None of the mentioned above

Answer: c. Cryptography

Explanation:

When it comes to cryptography, hash functions are used, and their levels of complexity and difficulty
might vary. Hash functions are utilized in a variety of applications, including cryptocurrency, password
security, and communication security. As data structures in computing systems, hash functions are
frequently employed to perform tasks such as verifying the integrity of communications and
authenticating information.

9) Hashes can be used to make sure messages and files transmitted from sender to receiver are not
tampered with during transit.

True

False
Answer: a. True

Explanation:

Hashes can be used to ensure that communications and files transported from sender to receiver are
not tampered with while in transit between the two parties. It is possible to secure data by hashing a
readable text into an unreadable text containing secure data. Hashing is a technique that is efficient to
use yet exceedingly complex to reverse.

10) Cryptographic hashing provides a barrier to potential _______.

Attackers

Sender

Receiver

None of the mentioned above

Answer: a. Attackers

Explanation:

Potential attackers are deterred from gaining access to sensitive information by cryptographic hashing. A
hostile individual attempting to gain access to the database will be able to see the hashes in the
database. The attacker, on the other hand, will be unable to reverse the hash value back to the original
password.

IncludeHelp

Home » Cryptography » Cryptography MCQs

MCQ | Cryptography Techniques of Block Cipher


Here, we have a set of multiple-choice questions and answers (quiz) on Cryptography Techniques of
Block Cipher.

Submitted by Monika Sharma, on March 22, 2020

1) What is the block size of plain text in SHA- 512 algorithm?

512 bits

1024 bits

2048 bits

None of the above

Answer: b. 1024 bits

Explanation:

The SHA- 512 algorithm uses blocks of plain text one at a time to encrypt them into ciphertext. The size
of each block in the SHA- 512 algorithm is 1024 bits.

2) All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm.
Which of the following process(s) are not performed in the final round of the AES?

Substitution bytes

Shift rows

Mix columns

Add round key

Options

i.

iii.
All of the mentioned

None of the mentioned

Answer: b. iii.

Explanation:

In the AES algorithm, the MIX COLUMN operation is performed in all the rounds except the final round
of the algorithm.

3) What does IDEA stand for in the world of cryptography?

or

The IDEA word in the IDEA algorithm is the abbreviation for which of the following?

Independent Decryption Environment Analysis

International Defense Encryption Area

International Data Encryption Algorithm

None of the above

Answer: c. International Data Encryption Algorithm

Explanation:

The IDEA Algorithm stands for "International Data Encryption Algorithm".

4) How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?

64 sub- keys
48 sub- keys

52 sub- keys

Only one key and no subkeys

Answer: c. 52 sub- keys

Explanation:

There are a total of 8 rounds in the IDEA technique for encryption and each of them uses 6 keys. Apart
from that, 4 extra keys are used in the final round that is the output transformation round. This gives us
a total of 52 subkeys.

(8 x 6) + 4 = 52

5) "The number of rounds in the AES algorithm depends upon the key size being used."

Which among the following shows a correct relation between the size of the key used and the number
of rounds performed in the AES algorithm?

128 key size: 10 rounds

192 key size: 12 rounds

256 key size: 14 rounds

All of the above

Answer: d. All of the above

Explanation:

All the mentioned options display the correct relation between the number of rounds and the key size
used in the AES algorithm.
6) Which of the following properties are the characteristic properties of a block cipher technique which
differs from stream cipher?

Avalanche effect

Completeness

Both a. and b.

None of the above

Answer: c. Both a. and b.

Explanation:

Avalanche effect and Completeness are the two characteristic properties of Block ciphers which differ
them from stream ciphers.

7) Encryption algorithms are divided into two categories based on the ______.

Output type

Input type

Process type

All of the mentioned above

Answer: b. Input type

Explanation:

Encryption algorithms are classified into two categories based on the type of input they receive: block
cyphers and stream cyphers. Block cyphers are the most used type of encryption technique. This type of
encryption technique takes as input a defined size of data, such as b bits, and outputs as output another
block of data of the same size as the input.

8) Cipher block chaining or CBC is an advancement made on _____.

Electronic Code Book

Decrypted code

System engineering

All of the mentioned above

Answer: a. Electronic Code Book

Explanation:

Cipher block chaining, also known as CBC, is an improvement on the Electronic Code Book. The
electronic code book is the most straightforward block cypher manner of operation. It is simpler since
each block of input plaintext is directly encrypted, and the output is in the form of blocks of encrypted
ciphertext.

9) A secure block cipher is suitable for the encryption,

True

False

Answer: a. True

Explanation:
A safe block cypher is a type of encryption that is ideal for encrypting only a single block of data at a
time with a fixed key. As building blocks of various cryptographic protocols, block cyphers can be found
in a variety of configurations, including universal hash functions and pseudorandom number generators.

10) Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.

Next block

Previous block

Middle block

All of the mentioned above

Answer: a. Next block

Explanation:

Cipher Feedback Mode is provided as feedback to the following block of encryption with some new
specifications, and it is used as a feedback mechanism.

11) In cryptography, a product cipher combines two or more transformations,

True

False

Answer: a. True

Explanation:

As used in cryptography, the term "product cypher" refers to the combination of two or more
transformations in such a way that the final cypher is more secure than the individual components and
hence more resistant to cryptanalysis. Using the product cypher, we may combine a series of simple
transformations such as substitution (S-box), permutation (P-box), and modular arithmetic into a more
complex transformation.

IncludeHelp

Home » Cryptography » Cryptography MCQs

MCQ | Block Cipher as IDEA, DES, AES, RSA in Cryptography

Here, we have a set of multiple-choice questions and answers (quiz) on Block Cipher as IDEA, DES, AES,
RSA in Cryptography.

Submitted by Monika Sharma, on March 22, 2020

1) In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is
different from other round.

5 similar rounds having 2 pair ; every alternate

9 ; the last

8 ; the first and last

10 ; no

Answer: b. 9; the last

Explanation:

Basically, in the AES-128 there are 9 rounds and the last round is different from other rounds.

2) Which of the following modes of operation in DES is used for operating?

Cipher Feedback Mode (CFB)

Cipher Block chaining (CBC)


Electronic code book (ECB)

Output Feedback Modes (OFB)

Answer: c. Electronic code book (ECB)

Explanation:

Mainly, the Electronic codebook mode is used for operating on short data as the same key is used for
each block in this algorithm. Thus convert in Plain Text lead to repetitions in Cipher Text in cryptography.

3) Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The
Ciphertext is:

42

93

114

103

Answer: c. 114

Explanation:

Calculate n = p × q = 63

Phi(n)=(p-1) x (q-1)=48

Let e=5 , where gcd(e,phi(n))=1

Plaintext M = 24

Ciphertext = C ≡ M^e (mod n)

= 24^5 mod 63 = 7962624 mod 161


Ciphertext transmitted = 114.

4) International Data Encryption Algorithm (IDEA) was developed by

Xuejia Lai and James Massey

Xuejia Lai and Bruce Schneier

Xuejia Lai and Carlisle Adams

Xuejia Lai and Stafford Tavares

Answer: a. Xuejia Lai and James Massey

Explanation:

It is a symmetric key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and in 1991 it
firstly described it.

5) When do we compare the AES with DES, which of the following functions from DES does not have an
equivalent AES function in cryptography?

f function

permutation p

swapping of halves

xor of subkey with function f

Answer: c. swapping of halves

Explanation:

Mainly, there is no equivalent to swapping of halves in the AES algorithm in cryptography.


6) Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.

16 bits

64 bits

32 bits

All of the mentioned above

Answer: b. 64 bits

Explanation:

When using the Data Encryption Standard, data is encrypted in blocks of 64 bits apiece, which means
that the data encryption standard requires 64 bits of plain text to be entered as input?

7) The process of decryption of an AES ciphertext is similar to the encryption process in the ______.

Reverse order

Next order

Both A and B

All of the mentioned above

Answer: a. Reverse order

Explanation:

The process of decrypting an AES ciphertext is quite similar to the process of encrypting it, except that it
is done in the opposite order. Each round is comprised of the four processes, which are carried out in
the opposite sequence of the previous round. Due to the fact that sub-processes in each round are
carried out in reverse order, as opposed to a Feistel Cipher, the encryption and decryption algorithms
must be developed separately, despite the fact that they are extremely closely connected.

8) AES stands for Advanced Encryption Standard,

True

False

Answer: a. True

Explanation:

Advanced Encryption Standard (AES) is an abbreviation for Advanced Encryption Standard. It was
thought to be vulnerable to an exhaustive key search attack because of the increase in computational
capacity. AES is an iterative cypher, as opposed to a Feistel cypher. Based on the ‘substitution–
permutation network,' it is a powerful tool. It is made up of a sequence of connected operations, some
of which require substituting certain inputs with specified outputs (substitutions), and others which
entail shuffling bits around (permutations).

9) RSA algorithm is ____ cryptography algorithm.

Systematic

Symmetric

Asymmetric

None of the mentioned above

Answer: c. Asymmetric

Explanation:
The RSA algorithm is a symmetric cryptography algorithm that uses a random number generator.
Asymmetric refers to the fact that it operates on two separate keys, namely the Public Key and the
Private Key.

10) Amongst which of the following is / are true with reference to the rounds in AES –

Byte Substitution

Shift Row

Mix Column and Key Addition

All of the mentioned above

Answer: d. All of the mentioned above

Explanation:

The rounds in AES are as follows: Byte Substitution, Shift Row, Mix Column, and Key Addition (in order of
appearance).

You might also like