MCQOPTIONS
Saved Bookmarks
This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following slows the cryptographic algorithm –1) Increase in Number of rounds2) Decrease in Block size3) Decrease in Key Size4) Increase in Sub key Generation |
| A. | 1 and 3 |
| B. | 2 and 3 |
| C. | 3 and 4 |
| D. | 2 and 4View Answer |
| Answer» C. 3 and 4 | |
| 2. |
This is an example of |
| A. | SP Networks |
| B. | Feistel Cipher |
| C. | Hash Algorithm |
| D. | Hill CipherView Answer |
| Answer» C. Hash Algorithm | |
| 3. |
The S-Box is used to provide confusion, as it is dependent on the unknown key. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 4. |
Confusion hides the relationship between the ciphertext and the plaintext. |
| A. | True |
| B. | False |
| Answer» C. | |
| 5. |
If the key is 110100001 where,If ki=0, then S_i (x)=((1 1 0 | 0 1 1 | 1 0 0 ))x+((1 1 1))and If ki=1, then S_i (x)=((0 1 1 | 1 0 1 | 1 0 0))x+((0 1 1))then the output of the SP network for the plaintext: 101110001 is |
| A. | 010110011 |
| B. | 111000011 |
| C. | 110110111 |
| D. | 010110110 |
| Answer» B. 111000011 | |
| 6. |
If the block size is ‘s’, how many affine transformations are possible ? |
| A. | 2s (2s-1)(2s-1)(2s-12)………(2s-1(s-1)) |
| B. | 2s (2s-1)(2s-2)(2s-22)………(2s-2(s-2)) |
| C. | 2ss (2s-1)(2s-2)(2s-22)………(2s-2(s-1)) |
| D. | 2s (2s-1)(2s-2)(2s-22)………(2s-2(s-3)) |
| Answer» D. 2s (2s-1)(2s-2)(2s-22)………(2s-2(s-3)) | |
| 7. |
In affine block cipher systems if f(m)=Am + t, what is f(m1+m2+m3) ? |
| A. | f(m1) + f(m2) + f(m3) + t |
| B. | f(m1) + f(m2) + f(m3) +2t |
| C. | f(m1) + f(m2) + f(m3) |
| D. | 2(f(m1) + f(m2) + f(m3)) |
| Answer» D. 2(f(m1) + f(m2) + f(m3)) | |
| 8. |
THE_S-BOX_IS_USED_TO_PROVIDE_CONFUSION,_AS_IT_IS_DEPENDENT_ON_THE_UNKNOWN_KEY.?$ |
| A. | True |
| B. | False |
| Answer» B. False | |
| 9. |
SP Networks$ |
| A. | Feistel Cipher |
| B. | Hash Algorithm |
| C. | Hill Cipher |
| Answer» C. Hill Cipher | |
| 10. |
Confusion hides the relationship between the ciphertext and the plaintext? |
| A. | True |
| B. | False |
| Answer» C. | |
| 11. |
If the key is 110100001 where, |
| A. | =((1 1 0 | 0 1 1 | 1 0 0 ))x+((1 1 1)) |
| B. | =((0 1 1 | 1 0 1 | 1 0 0))x+((0 1 1)) |
| C. | |
| Answer» B. =((0 1 1 | 1 0 1 | 1 0 0))x+((0 1 1)) | |
| 12. |
If the key is 110100001, the output of the SP network for the plaintext: 101110001 is |
| A. | 110100011 |
| B. | 110101110 |
| C. | 010110111 |
| D. | 011111010 |
| Answer» C. 010110111 | |
| 13. |
Super-Encipherment using two affine transformations results in another affine transformation. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 14. |
What is the number of possible 3 x 3 affine cipher transformations ? |
| A. | 168 |
| B. | 840 |
| C. | 1024 |
| D. | 1344 |
| Answer» E. | |
| 15. |
If the block size is ‘s’, how many affine transformations are possible ?$ |
| A. | 2<sup>s</sup> (2<sup>s</sup>-1)(2<sup>s</sup>-1)(2<sup>s</sup>-1<sup>2</sup>)………(2<sup>s</sup>-1<sup>(s-1)</sup>) |
| B. | 2<sup>s</sup> (2<sup>s</sup>-1)(2<sup>s</sup>-2)(2<sup>s</sup>-2<sup>2</sup>)………(2<sup>s</sup>-2<sup>(s-2)</sup>) |
| C. | 2<sup>s</sup>s (2<sup>s</sup>-1)(2<sup>s</sup>-2)(2<sup>s</sup>-2<sup>2</sup>)………(2<sup>s</sup>-2<sup>(s-1)</sup>) |
| D. | 2<sup>s</sup> (2<sup>s</sup>-1)(2<sup>s</sup>-2)(2<sup>s</sup>-2<sup>2</sup>)………(2<sup>s</sup>-2<sup>(s-3)</sup>) |
| Answer» D. 2<sup>s</sup> (2<sup>s</sup>-1)(2<sup>s</sup>-2)(2<sup>s</sup>-2<sup>2</sup>)‚Äö√Ñ√∂‚àö√묨‚àÇ‚Äö√Ñ√∂‚àö√묨‚àÇ‚Äö√Ñ√∂‚àö√묨‚àÇ(2<sup>s</sup>-2<sup>(s-3)</sup>) | |
| 16. |
In affine block cipher systems if f(m)=Am + t, what is f(m1+m2) ? |
| A. | f(m1) + f(m2) + t |
| B. | f(m1) + f(m2) + 2t |
| C. | f(m1) + t |
| D. | f(m1) + f(m2) |
| Answer» B. f(m1) + f(m2) + 2t | |