Iap 1

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 3

1.

DES follows
A. Caesars Cipher
B. Feistel Cipher Structure
C. Hash Algorithm
D. SP Networks

ANSWER: C
2. In the DES algorithm, although the key size is 64 bits only 48bits are used for
the encryption procedure, the rest are parity bits.
A. True
B. False
ANSWER: B
3. In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring
every 4th bit.
A. True
B. False
ANSWER: B
4. Which of the 4 operations are false for each round in the AES algorithm
i) Substitute Bytes
ii) Shift Columns
iii) Mix Rows
iv) XOR Round Key
A. i) only
B. ii) iii) and iv)
C. ii) and iii)
D. only iv)
ANSWER: B
5. There is an addition of round key before the start of the AES round algorithms.
A. True
B. False
ANSWER: B
6. Vigenere cipher is an example of ______________
A. mono-alphabetic cipher
B. poly-alphabetic cipher
C. transposition cipher
D. additive cipher

ANSWER: B
7. Vigenere table consists of _________
A. 26 rows and 26 columns
B. 26 rows and 1 column
C. 1 row and 26 columns
D. 27 rows and 27 columnssymmetric-key

ANSWER: A
8. What will be the plain text corresponding to cipher text �PROTO� if vigenere
cipher is used with keyword as �HELLO�?
A. SANFOUNDRY
B. WORLD
C. INDIA
D. AMERICA

ANSWER: C
9. What will be the ciphered text if the string �SANFOUNDRY� is given as input to
the code of vigenere cipher with keyword as �HELLO�?
A. UEWIIDKLL
B. ZEYQCOCM
C. ZEYQCBROCM
D. ZEYQCBROCMJDH
ANSWER: C
10. What is the correct comparison of SHA-1 and MD5
A. MD5 is more secure than SHA-1
B. SHA-1 is more computationally expensive than MD5
C. MD5 does not work on an extremely large input (> 2 64 bits) while SHA-1 does
D. Neither can be used as an encryption function

ANSWER: B
11. The ________ method provides a one-time session key for two parties.
A. Diffie-Hellman
B. RSA
C. DES
D. AES
ANSWER: A
12. What is the objective of Diffie-Hellman key exchange
A. To protect encrypted data from man-in-the-middle attack
B. To perform mutual authentication on both sides
C. To prove to another party that one holds a secret key without revealing it
D. To establish a shared secret key on both sides
ANSWER: D
13. The security of RSA encryption relies on which assumption
A. It is computationally infeasible to compute a GCD of two large numbers.
B. It is computationally infeasible to factor a large number.
C. It is computationally infeasible to test whether a large number is prime.
D. It is computationally infeasible to compute a square modulo n.
ANSWER: B
14. Which of the following options is not correct according to the definition of
the Cipher Block Chaining (CBC)?
A. CBC is a mode of operation for stream ciphers.
B. Initialization vector (IV) is used in CBC in the initial phase.
C. It has better resistive nature towards cryptanalysis than ECB
D. None of the above
ANSWER: A
15. Which of the following modes of operations can be followed for both stream
ciphers as well as block ciphers?
A. CBC (Cipher Block Chaining)
B. ECB (Electronic Code Book)
C. CFB (Cipher text Feed Back)
D. All of the above
ANSWER: C
16. Sender chooses p = 107, e1 = 2, d = 67, and the random integer is r=45. Find
the plaintext to be transmitted if the ciphertext is (28,9).
A. 45
B. 76
C. 66
D. 13
ANSWER: C
17. In Elgamal cryptosystem, given the prime p=31.Choose e1= first primitive root
of p and d=10, calculate e2.
A. 24
B. 36
C. 25
D. 62

ANSWER: C
18. �p = 5; q = 11; M = 9
A. 43
B. 14
C. 26
D. 37

ANSWER: B
19. n = 35; e = 5; C = 10. What is the plaintext (use RSA)
A. 3
B. 7
C. 8
D. 5

ANSWER: D
20. What is a one-way password file
A. A scheme in which the password is jumbled and stored
B. A scheme in which the password is XOR with a key and stored
C. A scheme in which the hash of the password is stored
D. A scheme in which the password is passed through a PRF, which is then stored

ANSWER: C

You might also like