MCQOPTIONS
Saved Bookmarks
This section includes 10 Mcqs, each offering curated multiple-choice questions to sharpen your Affine Cipher Multiple Choice knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
While choosing the value of a and m (m is the no. of alphabets) in affine cipher it must be ensured that? |
| A. | a and m are prime numbers |
| B. | a and m are odd numbers |
| C. | a and m are coprime |
| D. | a and m are even numbers |
| Answer» D. a and m are even numbers | |
| 2. |
What will be the plain text corresponding to ciphered text rmw if an affine cipher is used with key values as a=5, b=10? |
| A. | csk |
| B. | kkr |
| C. | srt |
| D. | msd |
| Answer» D. msd | |
| 3. |
Affine cipher is not susceptible to frequency analysis. |
| A. | true |
| B. | false |
| Answer» C. | |
| 4. |
Affine cipher is less secure than caesar cipher. |
| A. | true |
| B. | false |
| Answer» C. | |
| 5. |
Affine cipher is an example of? |
| A. | Mono alphabetic cipher |
| B. | Poly alphabetic cipher |
| C. | Transposition cipher |
| D. | Asymmetric cipher |
| Answer» B. Poly alphabetic cipher | |
| 6. |
What is the formula used for decoding the ciphered text using affine cipher(a,b are constants and x is the numerical equivalent of a letter to be encrypted)? |
| A. | a<sup>-1</sup>(x-b)%26 |
| B. | (ax+b)%26 |
| C. | b<sup>-1</sup>(x-a)%26 |
| D. | b<sup>-1</sup>(x-a) |
| Answer» B. (ax+b)%26 | |
| 7. |
What is the formula used for encryption of data using affine cipher(a,b are constants and x is the numerical equivalent of a letter to be encrypted)? |
| A. | ax+b |
| B. | (ax+b)%26 |
| C. | ax<sup>2</sup>+bx |
| D. | (ax<sup>2</sup>+bx)%26 |
| Answer» C. ax<sup>2</sup>+bx | |
| 8. |
Choose the weakest cipher from the following? |
| A. | Vigenere cipher |
| B. | Autokey cipher |
| C. | Affine cipher |
| D. | Hill cipher |
| Answer» D. Hill cipher | |
| 9. |
Which of the following cipher requires only one key for decoding the ciphered text? |
| A. | Affine cipher |
| B. | RSA |
| C. | DSA |
| D. | PKCS |
| Answer» B. RSA | |
| 10. |
Which of the following cipher makes use of linear algebra for encrypting data? |
| A. | polybius square cipher |
| B. | affine cipher |
| C. | caesar cipher |
| D. | rail fence cipher |
| Answer» C. caesar cipher | |