Explore topic-wise MCQs in Cryptography and Network Security.

This section includes 31 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Assume input 10-bit key, K: 1010000010 for the SDES algorithm. What is K2?

A. 10100111
B. 01000011
C. 00100100
D. 01011010
Answer» C. 00100100
2.

In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring every 4th bit.

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
3.

The number of unique substitution boxes in DES after the 48 bit XOR operation are

A. 8
B. 4
C. 6
D. 12
Answer» B. 4
4.

The number of tests required to break the DES algorithm are

A. 2.8×10^14
B. 4.2×10^9
C. 1.84×10^19
D. 7.2×10^16
Answer» E.
5.

The Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is

A. 01100111
B. 00001010
C. 11111111
D. 01101101
Answer» D. 01101101
6.

Using Differential Crypt-analysis, the minimum computations required to decipher the DES algorithm is

A. 2^56
B. 2^43
C. 2^55
D. 2^47
Answer» E.
7.

In triple DES, the key size is ___ and meet in the middle attack takes ___ tests to break the key.

A. 2192 ,2112
B. 2184,2111
C. 2168,2111
D. 2168,2112
Answer» E.
8.

Assume input 10-bit key, K: 0010010111 for the SDES algorithm. What is K1?

A. 00101111
B. 01011011
C. 01101000
D. 10100111
Answer» B. 01011011
9.

The Plaintext for the Ciphertext 11110000, given that the key is 0000000000 is

A. 01100111
B. 00000000
C. 01001000
D. 01101100
Answer» C. 01001000
10.

Assume input 10-bit key, K: 0010010111 for the SDES algorithm. What is K2?

A. 11101010
B. 11011011
C. 01101000
D. 10101111
Answer» B. 11011011
11.

The Plaintext for the Ciphertext 10100101, given that the key is 0010010111 is

A. 01100111
B. 00110110
C. 01001000
D. 01001100
Answer» C. 01001000
12.

Using Linear Crypt-analysis, the minimum computations required to decipher the DES algorithm is

A. 2^48
B. 2^43
C. 2^56
D. 2^64
Answer» C. 2^56
13.

During decryption, we use the Inverse Initial Permutation (IP-1) before the IP.

A. True
B. False
C. May be
D. Can't say
Answer» B. False
14.

A preferable cryptographic algorithm should have a good avalanche effect.

A. True
B. False
C. May be
D. Can't say
Answer» B. False
15.

How many keys does the Triple DES algorithm use?

A. 2
B. 3
C. 2 or 3
D. 3 or 4
Answer» D. 3 or 4
16.

In SDES, Encryption algorithm can be written as a composition of functions:IP-1 o fK2 o fK1 o SW o IP

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
17.

The number of tests required to break the Double DES algorithm are

A. 2112
B. 2111
C. 2128
D. 2119
Answer» C. 2128
18.

The S-Box is used to provide confusion, as it is dependent on the unknown key.

A. True
B. False
C. May be
D. Can't say
Answer» B. False
19.

If the key is 110100001 where,If ki=0, then S_i (x)=((1 1 0 | 0 1 1 | 1 0 0 ))x+((1 1 1))and If ki=1, then S_i (x)=((0 1 1 | 1 0 1 | 1 0 0))x+((0 1 1))then the output of the SP network for the plaintext: 101110001 is

A. 010110011
B. 111000011
C. 110110111
D. 010110110
Answer» B. 111000011
20.

Confusion hides the relationship between the ciphertext and the plaintext.

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
21.

Which of the following slows the cryptographic algorithm –1) Increase in Number of rounds2) Decrease in Block size3) Decrease in Key Size4) Increase in Sub key Generation

A. 1 and 3
B. 2 and 3
C. 3 and 4
D. 2 and 4
Answer» C. 3 and 4
22.

In affine block cipher systems if f(m)=Am + t, what is f(m1+m2+m3) ?

A. f(m1) + f(m2) + f(m3) + t
B. f(m1) + f(m2) + f(m3) +2t
C. f(m1) + f(m2) + f(m3)
D. 2(f(m1) + f(m2) + f(m3))
Answer» D. 2(f(m1) + f(m2) + f(m3))
23.

IN_THE_DES_ALGORITHM_THE_64_BIT_KEY_INPUT_IS_SHORTENED_TO_56_BITS_BY_IGNORING_EVERY_4TH_BIT.?$

A. True
B. False
Answer» C.
24.

The number of unique substitution boxes in DES after the 48 bit XOR operation ar?

A. 8
B. 4
C. 6
D. 12
Answer» B. 4
25.

The Initial Permutation table/matrix is of size

A. 16√ó8
B. 12√ó8
C. 8√ó8
D. 4√ó8
Answer» D. 4‚Äö√†√∂‚àö‚â•8
26.

In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________

A. Scaling of the existing bits
B. Duplication of the existing bits
C. Addition of zeros
D. Addition of ones
Answer» B. Duplication of the existing bits
27.

In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.

A. 48, 32
B. 64,32
C. 56, 24
D. 32, 32
Answer» B. 64,32
28.

In the DES algorithm, although the key size is 64 bits only 48bits are used for the encryption procedure, the rest are parity bits.

A. True
B. False
Answer» C.
29.

The DES algorithm has a key length of

A. 128 Bits
B. 32 Bits
C. 64 Bits
D. 16 Bits
Answer» D. 16 Bits
30.

The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key

A. 12
B. 18
C. 9
D. 16
Answer» E.
31.

DES follows

A. Hash Algorithm
B. Caesars Cipher
C. Feistel Cipher Structure
D. SP Networks
Answer» D. SP Networks