MCQOPTIONS
Saved Bookmarks
This section includes 31 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Assume input 10-bit key, K: 1010000010 for the SDES algorithm. What is K2? |
| A. | 10100111 |
| B. | 01000011 |
| C. | 00100100 |
| D. | 01011010 |
| Answer» C. 00100100 | |
| 2. |
In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring every 4th bit. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 3. |
The number of unique substitution boxes in DES after the 48 bit XOR operation are |
| A. | 8 |
| B. | 4 |
| C. | 6 |
| D. | 12 |
| Answer» B. 4 | |
| 4. |
The number of tests required to break the DES algorithm are |
| A. | 2.8×10^14 |
| B. | 4.2×10^9 |
| C. | 1.84×10^19 |
| D. | 7.2×10^16 |
| Answer» E. | |
| 5. |
The Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is |
| A. | 01100111 |
| B. | 00001010 |
| C. | 11111111 |
| D. | 01101101 |
| Answer» D. 01101101 | |
| 6. |
Using Differential Crypt-analysis, the minimum computations required to decipher the DES algorithm is |
| A. | 2^56 |
| B. | 2^43 |
| C. | 2^55 |
| D. | 2^47 |
| Answer» E. | |
| 7. |
In triple DES, the key size is ___ and meet in the middle attack takes ___ tests to break the key. |
| A. | 2192 ,2112 |
| B. | 2184,2111 |
| C. | 2168,2111 |
| D. | 2168,2112 |
| Answer» E. | |
| 8. |
Assume input 10-bit key, K: 0010010111 for the SDES algorithm. What is K1? |
| A. | 00101111 |
| B. | 01011011 |
| C. | 01101000 |
| D. | 10100111 |
| Answer» B. 01011011 | |
| 9. |
The Plaintext for the Ciphertext 11110000, given that the key is 0000000000 is |
| A. | 01100111 |
| B. | 00000000 |
| C. | 01001000 |
| D. | 01101100 |
| Answer» C. 01001000 | |
| 10. |
Assume input 10-bit key, K: 0010010111 for the SDES algorithm. What is K2? |
| A. | 11101010 |
| B. | 11011011 |
| C. | 01101000 |
| D. | 10101111 |
| Answer» B. 11011011 | |
| 11. |
The Plaintext for the Ciphertext 10100101, given that the key is 0010010111 is |
| A. | 01100111 |
| B. | 00110110 |
| C. | 01001000 |
| D. | 01001100 |
| Answer» C. 01001000 | |
| 12. |
Using Linear Crypt-analysis, the minimum computations required to decipher the DES algorithm is |
| A. | 2^48 |
| B. | 2^43 |
| C. | 2^56 |
| D. | 2^64 |
| Answer» C. 2^56 | |
| 13. |
During decryption, we use the Inverse Initial Permutation (IP-1) before the IP. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 14. |
A preferable cryptographic algorithm should have a good avalanche effect. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 15. |
How many keys does the Triple DES algorithm use? |
| A. | 2 |
| B. | 3 |
| C. | 2 or 3 |
| D. | 3 or 4 |
| Answer» D. 3 or 4 | |
| 16. |
In SDES, Encryption algorithm can be written as a composition of functions:IP-1 o fK2 o fK1 o SW o IP |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 17. |
The number of tests required to break the Double DES algorithm are |
| A. | 2112 |
| B. | 2111 |
| C. | 2128 |
| D. | 2119 |
| Answer» C. 2128 | |
| 18. |
The S-Box is used to provide confusion, as it is dependent on the unknown key. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 19. |
If the key is 110100001 where,If ki=0, then S_i (x)=((1 1 0 | 0 1 1 | 1 0 0 ))x+((1 1 1))and If ki=1, then S_i (x)=((0 1 1 | 1 0 1 | 1 0 0))x+((0 1 1))then the output of the SP network for the plaintext: 101110001 is |
| A. | 010110011 |
| B. | 111000011 |
| C. | 110110111 |
| D. | 010110110 |
| Answer» B. 111000011 | |
| 20. |
Confusion hides the relationship between the ciphertext and the plaintext. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» C. May be | |
| 21. |
Which of the following slows the cryptographic algorithm –1) Increase in Number of rounds2) Decrease in Block size3) Decrease in Key Size4) Increase in Sub key Generation |
| A. | 1 and 3 |
| B. | 2 and 3 |
| C. | 3 and 4 |
| D. | 2 and 4 |
| Answer» C. 3 and 4 | |
| 22. |
In affine block cipher systems if f(m)=Am + t, what is f(m1+m2+m3) ? |
| A. | f(m1) + f(m2) + f(m3) + t |
| B. | f(m1) + f(m2) + f(m3) +2t |
| C. | f(m1) + f(m2) + f(m3) |
| D. | 2(f(m1) + f(m2) + f(m3)) |
| Answer» D. 2(f(m1) + f(m2) + f(m3)) | |
| 23. |
IN_THE_DES_ALGORITHM_THE_64_BIT_KEY_INPUT_IS_SHORTENED_TO_56_BITS_BY_IGNORING_EVERY_4TH_BIT.?$ |
| A. | True |
| B. | False |
| Answer» C. | |
| 24. |
The number of unique substitution boxes in DES after the 48 bit XOR operation ar? |
| A. | 8 |
| B. | 4 |
| C. | 6 |
| D. | 12 |
| Answer» B. 4 | |
| 25. |
The Initial Permutation table/matrix is of size |
| A. | 16√ó8 |
| B. | 12√ó8 |
| C. | 8√ó8 |
| D. | 4√ó8 |
| Answer» D. 4‚Äö√†√∂‚àö‚â•8 | |
| 26. |
In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________ |
| A. | Scaling of the existing bits |
| B. | Duplication of the existing bits |
| C. | Addition of zeros |
| D. | Addition of ones |
| Answer» B. Duplication of the existing bits | |
| 27. |
In the DES algorithm the round key is __________ bit and the Round Input is ____________bits. |
| A. | 48, 32 |
| B. | 64,32 |
| C. | 56, 24 |
| D. | 32, 32 |
| Answer» B. 64,32 | |
| 28. |
In the DES algorithm, although the key size is 64 bits only 48bits are used for the encryption procedure, the rest are parity bits. |
| A. | True |
| B. | False |
| Answer» C. | |
| 29. |
The DES algorithm has a key length of |
| A. | 128 Bits |
| B. | 32 Bits |
| C. | 64 Bits |
| D. | 16 Bits |
| Answer» D. 16 Bits | |
| 30. |
The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key |
| A. | 12 |
| B. | 18 |
| C. | 9 |
| D. | 16 |
| Answer» E. | |
| 31. |
DES follows |
| A. | Hash Algorithm |
| B. | Caesars Cipher |
| C. | Feistel Cipher Structure |
| D. | SP Networks |
| Answer» D. SP Networks | |