MCQOPTIONS
Saved Bookmarks
This section includes 17 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
There is an addition of round key before the start of the AES round algorithms. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 2. |
Which of the 4 operations are false for each round in the AES algorithmi) Substitute Bytesii) Shift Columnsiii) Mix Rowsiv) XOR Round Key |
| A. | i) only |
| B. | ii) iii) and iv) |
| C. | ii) and iii) |
| D. | only iv)View Answer |
| Answer» C. ii) and iii) | |
| 3. |
For the AES-128 algorithm there are __________ similar rounds and _________ round is different. |
| A. | 2 pair of 5 similar rounds ; every alternate |
| B. | 9 ; the last |
| C. | 8 ; the first and last |
| D. | 10 ; no |
| Answer» C. 8 ; the first and last | |
| 4. |
In AES the 4×4 bytes matrix key is transformed into a keys of size __________ |
| A. | 32 words |
| B. | 64 words |
| C. | 54 words |
| D. | 44 words |
| Answer» E. | |
| 5. |
The 4×4 byte matrices in the AES algorithm are called |
| A. | States |
| B. | Words |
| C. | Transitions |
| D. | Permutations |
| Answer» B. Words | |
| 6. |
How many rounds does the AES-256 perform? |
| A. | 10 |
| B. | 12 |
| C. | 14 |
| D. | 16 |
| Answer» D. 16 | |
| 7. |
IN_AES_THE_4‚ÄÖ√†√∂‚Àւ•4_BYTES_MATRIX_KEY_IS_TRANSFORMED_INTO_A_KEYS_OF_SIZE___________?$# |
| A. | 32 words |
| B. | 64 words |
| C. | 54 words |
| D. | 44 words |
| Answer» E. | |
| 8. |
Which of the 4 operations are false for each round in the AES algorithm$ |
| A. | Substitute Bytes |
| B. | Shift Columns |
| C. | Mix Rows |
| D. | XOR Round Key |
| Answer» C. Mix Rows | |
| 9. |
For_the_AES-128_algorithm_there_are____________similar_rounds_and___________round_is_different.$ |
| A. | 2 pair of 5 similar rounds ; every alternate |
| B. | 9 ; the last |
| C. | 8 ; the first and last |
| D. | 10 ; no |
| Answer» C. 8 ; the first and last | |
| 10. |
i)_only |
| A. | ii) iii) and iv) |
| B. | ii) and iii) |
| C. | only iv) |
| Answer» B. ii) and iii) | |
| 11. |
The 4√ó4 byte matrices in the AES algorithm are calle?# |
| A. | States |
| B. | Words |
| C. | Transitions |
| D. | Permutations |
| Answer» B. Words | |
| 12. |
What is the expanded key size of AES-192? |
| A. | 44 words |
| B. | 60 words |
| C. | 52 words |
| D. | 36 words |
| Answer» D. 36 words | |
| 13. |
How many rounds does the AES-192 perform? |
| A. | 10 |
| B. | 12 |
| C. | 14 |
| D. | 16 |
| Answer» C. 14 | |
| 14. |
Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm? |
| A. | MARS |
| B. | Blowfish |
| C. | RC6 |
| D. | Rijndael |
| Answer» B. Blowfish | |
| 15. |
Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent? |
| A. | JUPITER |
| B. | Blowfish |
| C. | Serpent |
| D. | Rijndael |
| Answer» B. Blowfish | |
| 16. |
Like DES, AES also uses Feistel Structure. |
| A. | True |
| B. | False |
| Answer» C. | |
| 17. |
AES uses a ____________ bit block size and a key size of __________ bits. |
| A. | 128; 128 or 256 |
| B. | 64; 128 or 192 |
| C. | 256; 128, 192, or 256 |
| D. | 128; 128, 192, or 256 |
| Answer» E. | |