Computer Sci - WPS Offic
Computer Sci - WPS Offic
Computer Sci - WPS Offic
Here, we have a set of multiple-choice questions and answers (quiz) on ciphers in Cryptography (basic
concepts of Cryptography Techniques and different types of ciphers).
1) We are provided the plain text “SUN”. You need to convert the given plain text into ciphertext under
the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the
given text if the key is 2?
UWP
NUS
WUP
QSL
Answer: a) UWP
Explanation:
E ( P , K ) = ( P + K ) mod 26
Therefore,
E ( S , 2 ) = ( 18 + 2 ) mod 26 = 20 = U
E ( U , 2 ) = ( 20 + 2 ) mod 26 = 22 = W
E ( N , 2 ) = ( 13 + 2 ) mod 26 = 15 = P
Hence, the ciphertext is "UWP".
An integer
A string
Answer: c) A string
Explanation:
In Caesar cipher, we can choose a number or a character which when performed addition modulo
operation with the given letters of the plain text gives us ciphertext. However, a string cannot be chosen
for encryption in this case.
3) Which of the following cipher techniques include the involvement of matrix operations in their
algorithms of encryption and decryption?
Hill Cipher
Playfair cipher
Both a and b
Explanation:
The hill cipher includes a square matrix as the key, and in Playfair cipher, we create a 5X5 matrix using
the given key string. Hence, both these ciphers include the use of matrices.
Caesar cipher
Vernam cipher
Playfair cipher
Explanation:
The Playfair cipher uses a block of plain text, each block containing 2 characters.
Explanation:
The Diffie Hellman cipher uses asymmetric key cryptography. It uses a pair of keys, one private and one
public.
True
False
Answer: a) True
Explanation:
In cryptography, the terms "cypher" and "code" are synonymous since they both refer to a sequence of
processes that encrypt a message; nonetheless, the ideas are separate in cryptography, particularly
classical cryptography.
Fixed size
Variable
Integration
Explanation:
Block cyphers amass symbols in a message of a fixed size (the block), whereas stream cyphers operate
on a stream of symbols that is constantly changing. When a cypher employs the same key for both
encryption and decryption, the algorithm or cypher is referred to as a symmetric key algorithm.
Asymmetric key algorithms, also known as cyphers, encrypt and decrypt data using a different key for
each operation.
8) With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.
Different
Same
Both A and B
Answer: b) Same
Explanation:
When using symmetric key techniques, the same key is utilized for both the encryption and decryption
of the information being transmitted. Asymmetric key algorithms, which encrypt and decrypt data using
public and private keys, are used to protect sensitive information.
Edited
Main Text
Plain text
Explanation:
Plain text is a message or data that may be read by the sender, the receiver, or any third party who
happens to come across it. When plain text is altered by the application of certain algorithms or
procedures, the resulting data or message is referred to as ciphertext.
10) In the case of symmetric key encryption, the secret key that both the parties possess can be
anything such as a _______.
Passcode or a password
Developed code
Network set
Explanation:
With symmetric key encryption, the secret key that both parties have access to can be anything, such as
a passcode or a password, depending on the circumstances. Also, a random string of characters or
numbers generated using a secure Random Number Generator (RNG) can be used to represent it.
IncludeHelp
Here, we have a set of multiple-choice questions and answers (quiz) on cryptography basics (basic
concepts of cryptography techniques).
Playfair cipher
Explanation:
The Diffie Hellman uses a pair of asymmetric keys for encryption and decryption processes. All the rest
mentioned cipher techniques use the same key for encryption as well as decryption.
Data Confidentiality
Data Integrity
Authentication
Explanation:
All the first three options are the principles of data security. None of the mentioned characteristics fall
apart form these principles. Therefore, the correct answer is none of the above.
Masquerade
Modification of message
Denial of service
Traffic analysis
Explanation:
In a passive attack, the attacker does not modify any part of the data. His attempt is only to obtain the
information and not to modify it. From the mentioned options, this happens only in Traffic analysis in
which the attacker monitors the pattern of transmission. The rest other options are examples of active
attacks.
4) Which of the following options correctly defines the Brute force attack?
Brutally forcing the user to share the useful information like pins and passwords.
Explanation:
An integer values
A square matrix
Explanation:
As the key can be any string of bits, all the mentioned options are capable of becoming a key in a
cryptographic algorithm.
ADVERTISEMENT
Cryptography
Algorithm
Data flow
None of these
Answer: a) Cryptography
Explanation:
Special Symbols
Function Keys
All of these
Explanation:
True
False
Answer: a) True
Explanation:
The plaintext is used to encrypt to different cipher text with different keys.
9) Conventional cryptography also known as ... encryption.
asymmetric-key
logical-key
symmetric-key
None of these
Answer: c) symmetric-key
Explanation:
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
ADVERTISEMENT
Asymmetric
None of these
Explanation:
Confidentiality
Authenticityn
Data integrityn
Non-repudiation
All of these
Explanation:
Confidentiality, authenticity, data integrity and non-repudiation security are the key goals of
cryptography.
False
Answer: a) True
Explanation:
Encrypted message
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Explanation:
Sender
Receiver
ADVERTISEMENT
Answer: b) Receiver
Explanation:
16) Which one of the following algorithms is not used in asymmetric-key cryptography?
DSA algorithm
Diffie-Hellman algorithm
RSA algorithm
Explanation:
The electronic code book algorithm is a block cypher method in which a block of data corresponds to
each block of text in the encrypted message.
17) Which is the cryptographic protocol that is used to protect an HTTP connection?
SCTP
TLS
ECN
Explanation:
In order to prevent eavesdropping, tampering and message forgery, TLS has strong message
authentication and key-material generation.
18) A key is a value that works with a cryptographic algorithm to produce a specific cipher text.
True
False
Answer: a) True
Explanation:
A key is a value that works with a cryptographic algorithm to produce a specific cipher text.
19) A Public key size and conventional cryptography’s secret key size are closely related with one
another.
True
False
Answer: b) False
Explanation:
A Public key size and conventional cryptography’s secret key size are unrelated with one another.
Public-key cryptography
Private-key cryptography
Both
None of these
Explanation:
The ElGamal encryption scheme in cryptography is an asymmetrical key encryption algorithm based on
the Diffie-Hellman key exchange for public-key cryptography.
IncludeHelp
Here, we have a set of multiple-choice questions and answers (quiz) on ciphers in Cryptography (basic
concepts of Cryptography Techniques and different types of ciphers).
1) You are supposed to use hill cipher for encryption technique. You are provided with the following
matrix,
A = [ 4 2
2 1]
Yes
No
Can't be determined
Data insufficient
Answer: b) No
Explanation:
For choosing any square matrix as a key, it should be taken care that the matrix is invertible, i.e. its
inverse must exist. Here, in this case,
|A|=0
Therefore, it means that 'A' is not an invertible matrix. Hence matrix 'A' cannot be chosen as a key
matrix for encryption in the Hill cipher.
2) The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following
properties are not shown by the fiestal structure?
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
Explanation:
The fiestal structure does not require the conversion of the plain text into matrix form at any of its
steps.
3) Among the following given options, chose the strongest encryption technique?
Double DES
Triple DES
Explanation:
It has been proved that the AES performs much better than the all the other DES, whether it be single
DES or series of DES.
Explanation:
The RSA algorithm was named after the three scientists who developed this technique and the name
RSA is itself the abbreviation of their names: Rivest, Shamir, and Adleman.
Substitution bytes
Shift Rows
Mix columns
The above steps are performed in each round of which of the following ciphers?
Explanation:
Decrypt
Both A and B
Explanation:
Codes and cyphers are two separate methods of encrypting and decrypting messages. Using a code, you
may make any message more or less meaningful by substituting each word with another that has a
different meaning.
Set
Block
Rack
Answer: b) Block
Explanation:
Block cyphers are used to encrypt data in blocks of consistent size. A block cypher takes a block of
plaintext bits and generates a block of ciphertext bits, which are typically the same size as the plaintext
blocks they are given. In the given system, the size of the block is fixed at a certain size.
8) Images can also be encrypted in sentences,
True
False
Answer: A) True
Explanation:
Images can also be encoded in the form of phrases. Steganography is the term used to describe this.
Steganography is a type of encryption procedure in which you write one thing but truly mean something
completely different when you read it.
Unsecured data
Secured data
Insecure
Explanation:
Decryption is a process to unveil the secured data, and for it, the structure obtains and transforms the
mixed-up data and modifies it into an accessible language and image for both the reader along the
system.
10) Symmetric encryption gathers plain-text data and then shuffles it to make it unreadable.
True
False
Answer: a) True
Explanation:
Simple text data is collected and then shuffled in order to render it unreadable using symmetric
encryption. And, just before it reaches the intended.
IncludeHelp
Here, we have a set of multiple-choice questions and answers (quiz) on hash functions in Cryptography
(basic concepts of Cryptography Hash Functions).
Authentication
Non repudiation
Data Integrity
Explanation:
The Hash functions offer all the mentioned properties in a data compression: i.e. authentication, Non
repudiation and Data Integrity.
Pre-Image Resistance
Compression
Explanation:
All the first three options are the properties of the Hash function. None of the mentioned characteristic
fall apart form them. Therefore, the correct answer is none of the above.
3) Which of the following security services cannot be achieved using the Hash functions?
OR
Password Check
Digital Signatures
As the hash functions are irreversible and has pre-image resistance property, therefore it is almost
impossible to obtain the original data form its hash value. Therefore, it is not possible to retrieve data in
its original form from its hash value.
4) Which of the following options is not correct according to the definition of the Hash Function?
The hash functions work on arbitrary length input but produces fixed length output.
Explanation:
All the first three options obey to the definition of the Hash function. None of the mentioned options fall
apart form it. Therefore, the correct answer is none of the above.
5) "The Hash Function takes an input of arbitrary length and converts it into a fixed length output."
Which of the following names can we use for denoting the output of the hash function?
Hash value
Hash Code
Message Digest
All the mentioned names can be used to denote the output of a hash function. Therefore, the correct
answer is d. All of the above.
Variety
Validity
Veracity
Answer: b. Validity
Explanation:
A cryptographic hash function verifies the validity of data. It has several uses, including information
security (e.g., user authentication).
7) Hash functions are mathematical functions that transform or "map" a given set of data into a bit
string of fixed size, also known as the hash value.
Hash value
Map value
Both A and B
Hash functions are mathematical functions that transform or "map" a given collection of data into a bit
string of defined length, which is referred to as the hash value. Hash functions are used in cryptography.
A hash value is the result of converting plaintext or ciphertext to hash value. Any kind of data can be
transformed into a particular text string using hashing, which is a cryptographic approach.
8) Hash functions are used in ___ and have variable levels of complexity and difficulty.
System approach
Cyber safe
Cryptography
Answer: c. Cryptography
Explanation:
When it comes to cryptography, hash functions are used, and their levels of complexity and difficulty
might vary. Hash functions are utilized in a variety of applications, including cryptocurrency, password
security, and communication security. As data structures in computing systems, hash functions are
frequently employed to perform tasks such as verifying the integrity of communications and
authenticating information.
9) Hashes can be used to make sure messages and files transmitted from sender to receiver are not
tampered with during transit.
True
False
Answer: a. True
Explanation:
Hashes can be used to ensure that communications and files transported from sender to receiver are
not tampered with while in transit between the two parties. It is possible to secure data by hashing a
readable text into an unreadable text containing secure data. Hashing is a technique that is efficient to
use yet exceedingly complex to reverse.
Attackers
Sender
Receiver
Answer: a. Attackers
Explanation:
Potential attackers are deterred from gaining access to sensitive information by cryptographic hashing. A
hostile individual attempting to gain access to the database will be able to see the hashes in the
database. The attacker, on the other hand, will be unable to reverse the hash value back to the original
password.
IncludeHelp
512 bits
1024 bits
2048 bits
Explanation:
The SHA- 512 algorithm uses blocks of plain text one at a time to encrypt them into ciphertext. The size
of each block in the SHA- 512 algorithm is 1024 bits.
2) All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm.
Which of the following process(s) are not performed in the final round of the AES?
Substitution bytes
Shift rows
Mix columns
Options
i.
iii.
All of the mentioned
Answer: b. iii.
Explanation:
In the AES algorithm, the MIX COLUMN operation is performed in all the rounds except the final round
of the algorithm.
or
The IDEA word in the IDEA algorithm is the abbreviation for which of the following?
Explanation:
4) How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?
64 sub- keys
48 sub- keys
52 sub- keys
Explanation:
There are a total of 8 rounds in the IDEA technique for encryption and each of them uses 6 keys. Apart
from that, 4 extra keys are used in the final round that is the output transformation round. This gives us
a total of 52 subkeys.
(8 x 6) + 4 = 52
5) "The number of rounds in the AES algorithm depends upon the key size being used."
Which among the following shows a correct relation between the size of the key used and the number
of rounds performed in the AES algorithm?
Explanation:
All the mentioned options display the correct relation between the number of rounds and the key size
used in the AES algorithm.
6) Which of the following properties are the characteristic properties of a block cipher technique which
differs from stream cipher?
Avalanche effect
Completeness
Both a. and b.
Explanation:
Avalanche effect and Completeness are the two characteristic properties of Block ciphers which differ
them from stream ciphers.
7) Encryption algorithms are divided into two categories based on the ______.
Output type
Input type
Process type
Explanation:
Encryption algorithms are classified into two categories based on the type of input they receive: block
cyphers and stream cyphers. Block cyphers are the most used type of encryption technique. This type of
encryption technique takes as input a defined size of data, such as b bits, and outputs as output another
block of data of the same size as the input.
Decrypted code
System engineering
Explanation:
Cipher block chaining, also known as CBC, is an improvement on the Electronic Code Book. The
electronic code book is the most straightforward block cypher manner of operation. It is simpler since
each block of input plaintext is directly encrypted, and the output is in the form of blocks of encrypted
ciphertext.
True
False
Answer: a. True
Explanation:
A safe block cypher is a type of encryption that is ideal for encrypting only a single block of data at a
time with a fixed key. As building blocks of various cryptographic protocols, block cyphers can be found
in a variety of configurations, including universal hash functions and pseudorandom number generators.
10) Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.
Next block
Previous block
Middle block
Explanation:
Cipher Feedback Mode is provided as feedback to the following block of encryption with some new
specifications, and it is used as a feedback mechanism.
True
False
Answer: a. True
Explanation:
As used in cryptography, the term "product cypher" refers to the combination of two or more
transformations in such a way that the final cypher is more secure than the individual components and
hence more resistant to cryptanalysis. Using the product cypher, we may combine a series of simple
transformations such as substitution (S-box), permutation (P-box), and modular arithmetic into a more
complex transformation.
IncludeHelp
Here, we have a set of multiple-choice questions and answers (quiz) on Block Cipher as IDEA, DES, AES,
RSA in Cryptography.
1) In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is
different from other round.
9 ; the last
10 ; no
Explanation:
Basically, in the AES-128 there are 9 rounds and the last round is different from other rounds.
Explanation:
Mainly, the Electronic codebook mode is used for operating on short data as the same key is used for
each block in this algorithm. Thus convert in Plain Text lead to repetitions in Cipher Text in cryptography.
3) Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The
Ciphertext is:
42
93
114
103
Answer: c. 114
Explanation:
Calculate n = p × q = 63
Phi(n)=(p-1) x (q-1)=48
Plaintext M = 24
Explanation:
It is a symmetric key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and in 1991 it
firstly described it.
5) When do we compare the AES with DES, which of the following functions from DES does not have an
equivalent AES function in cryptography?
f function
permutation p
swapping of halves
Explanation:
16 bits
64 bits
32 bits
Answer: b. 64 bits
Explanation:
When using the Data Encryption Standard, data is encrypted in blocks of 64 bits apiece, which means
that the data encryption standard requires 64 bits of plain text to be entered as input?
7) The process of decryption of an AES ciphertext is similar to the encryption process in the ______.
Reverse order
Next order
Both A and B
Explanation:
The process of decrypting an AES ciphertext is quite similar to the process of encrypting it, except that it
is done in the opposite order. Each round is comprised of the four processes, which are carried out in
the opposite sequence of the previous round. Due to the fact that sub-processes in each round are
carried out in reverse order, as opposed to a Feistel Cipher, the encryption and decryption algorithms
must be developed separately, despite the fact that they are extremely closely connected.
True
False
Answer: a. True
Explanation:
Advanced Encryption Standard (AES) is an abbreviation for Advanced Encryption Standard. It was
thought to be vulnerable to an exhaustive key search attack because of the increase in computational
capacity. AES is an iterative cypher, as opposed to a Feistel cypher. Based on the ‘substitution–
permutation network,' it is a powerful tool. It is made up of a sequence of connected operations, some
of which require substituting certain inputs with specified outputs (substitutions), and others which
entail shuffling bits around (permutations).
Systematic
Symmetric
Asymmetric
Answer: c. Asymmetric
Explanation:
The RSA algorithm is a symmetric cryptography algorithm that uses a random number generator.
Asymmetric refers to the fact that it operates on two separate keys, namely the Public Key and the
Private Key.
10) Amongst which of the following is / are true with reference to the rounds in AES –
Byte Substitution
Shift Row
Explanation:
The rounds in AES are as follows: Byte Substitution, Shift Row, Mix Column, and Key Addition (in order of
appearance).