Explore topic-wise MCQs in Cryptography and Network Security.

This section includes 62 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Confidentiality can only be provided if we perform message encryption before the MAC generation.

A. True
B. False
Answer» C.
2.

The following figure has authentication tied to the plaintext-

A. True
B. False
Answer» C.
3.

The above figure represents internal error control.

A. True
B. FalseView Answer
Answer» C.
4.

The above figure implements authentication and signature only?

A. True
B. FalseView Answer
Answer» B. FalseView Answer
5.

The criticality indicator indicates whether an extension can be safely ignored.

A. True
B. False
C. May be
D. Can't say
Answer» B. False
6.

Which of these systems use timestamps as an expiration date?

A. Public-Key Certificates
B. Public announcements
C. Publicly available directories
D. Public-Key authority
Answer» B. Public announcements
7.

“Meet in the middle attack” and “man in the middle attack” are the same.

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
8.

Which session key is used for electronic funds transfer and point of sale applications?

A. Data-encrypting key
B. File-encrypting key
C. PIN-encrypting key
D. None of the mentioned
Answer» D. None of the mentioned
9.

Sometimes a simple tag is introduced along with the session key. This tag has 8 bits. Which of the following options is wrong?

A. One bit indicates whether the key is a session key or a master key
B. One bit indicates whether the key can be used for encryption
C. Three bit indicates whether the key can be used for decryption
D. Remaining bits are for future use
Answer» D. Remaining bits are for future use
10.

Hash Value = H = h(CV)Key Input = Km XOR HCiphertext = E([Km XOR H],Ks)What is CV here?

A. Cipher vector
B. Current vector
C. Control vector
D. None of the mentioned
Answer» D. None of the mentioned
11.

“Meet in the middle attack” is an attack

A. where the timing required for the attack via brute force is drastically reduced
B. where the adversary uses 2 or more machines to decrypt thus trying to reduce the time
C. where messages are intercepted and then either relayed or substituted with another message
D. where cryptanalysis takes lesser time than the brute force decryption
Answer» D. where cryptanalysis takes lesser time than the brute force decryption
12.

How many add round key functions are present in the Whirlpool algorithm?

A. 16
B. 18
C. 11
D. 10
Answer» D. 10
13.

There’s no known successful attacks made against Whirlpool.

A. True
B. False
C. May be
D. Can't say
Answer» B. False
14.

The Round Constant is given by S[8(r-1)+j]. What are the limits of ‘r’?

A. 0 <= r <= 11
B. 0 <= r <= 12
C. 0 <= r <= 10
D. 0 <= r <=16
Answer» D. 0 <= r <=16
15.

The 7th row in the 8 × 8 matrix undergoes a ___________ shift.

A. 6 bit
B. 6 byte
C. 7 bit
D. 7 byte
Answer» C. 7 bit
16.

How many XOR gate operations are involved in the S-box permutation?

A. 12
B. 8
C. 16
D. 4
Answer» B. 8
17.

Which Authentication Encryption approach is taken by the SSH protocol?

A. Hashing followed by encryption (H→E)
B. Encryption followed by authentication (E→A)
C. Authentication followed by encryption (A→E)
D. Independently encrypt and authenticate (E + A)
Answer» E.
18.

In GCM, we define S as S = GHASH(A||0^v||C||0^u||[len(A)]||[len(C)]). What is v defined as?

A. 64 ceil[len (A)/128] – len (A)
B. 64 ceil[len (C)/128] – len (C)
C. 128 ceil[len (A)/128] – len (A)
D. 128 ceil[len (C)/128] – len (C)
Answer» D. 128 ceil[len (C)/128] – len (C)
19.

The hash matrix of 8 × 8 is preferred over a 16 × 4 matrix because

A. it is symmetric
B. it is smaller in size
C. it is faster in computation
D. none of the mentioned
Answer» D. none of the mentioned
20.

How many rounds are there in one Whirlpool Iteration?

A. 3
B. 4
C. 6
D. 8
Answer» C. 6
21.

For a 100 bit key and a 32 bit tag, how many possible keys can be produced in the 3rd round?

A. 2^4
B. 2^32
C. 2^16
D. 2^64
Answer» B. 2^32
22.

MACs are also called

A. testword
B. checkword
C. testbits
D. none of the mentioned
Answer» E.
23.

Publicly Available directory is more secure than which other system?

A. Public-Key Certificates
B. Public announcements
C. Public-Key authority
D. None of the mentioned
Answer» C. Public-Key authority
24.

Which is the correct representation for session key recovery for the plain text?

A. D ([Km XOR H], E([Km XOR H], Ks)
B. D([Km XOR H],Ks)
C. D ([Km XOR H], E([Km XOR H])
D. None of the mentioned
Answer» B. D([Km XOR H],Ks)
25.

What is the size of the key in the algorithm?

A. 256 bits
B. 512 bits
C. 128 bits
D. 1024 bits
Answer» C. 128 bits
26.

When the Round Constant is given by S[8(r-1)+j]. What are the limits of ‘i’ and ‘j’?

A. i = 1 ; 0 <= j <= 7
B. i = 0 ; 0 <= j <= 7
C. 0 <= i <= 7; 0 <= j <= 7
D. 0 <= i <= 7; j=0
Answer» C. 0 <= i <= 7; 0 <= j <= 7
27.

Larger networks would prefer a full decentralization.

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
28.

Which of the following is required to find the session key?i) Control Vectorii) Master Keyiii) Encrypted session Key

A. i)
B. i) and ii)
C. i) and iii)
D. i) ii) and iii)
Answer» E.
29.

Which system uses a trusted third party interface?

A. Public-Key Certificates
B. Public announcements
C. Publicly available directories
D. Public-Key authority
Answer» B. Public announcements
30.

Hashing followed by encryption (H→E) is used by which algorithm?

A. IPSec
B. SSH
C. WEP
D. SSL/TLS
Answer» D. SSL/TLS
31.

Each round uses a different key in the algorithm.

A. True
B. False
C. May be
D. Can't say
Answer» B. False
32.

The 8 × 8 hash matrix holds values of size

A. 16 bits
B. 32 bits
C. 8 bits
D. 4 bits
Answer» D. 4 bits
33.

MAC is a

A. one-to-one mapping
B. many-to-one mapping
C. onto mapping
D. none of the mentioned
Answer» C. onto mapping
34.

Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in the correct order as –

A. X2 X1 X1 B
B. X1 X1 X2 A
C. X1 X2 X2 B
D. X1 X2 X2 A
Answer» D. X1 X2 X2 A
35.

Mix Row functions operate on the 8 × 8 matrix (A) to form the new matrix. The operation can be considered to be B = AC. The matrix C is formed by

A. each successive even row having left shifts
B. each successive row having a left shifts
C. each successive odd row having right shifts
D. each successive row having a right shifts
Answer» E.
36.

Which one of these is not a Whirlpool function?

A. Add Key
B. Substitute Bytes
C. Mix Rows
D. Shift Rows
Answer» E.
37.

Which of these is not a type of session key?

A. PIN-encrypting key
B. File-encrypting key
C. Session encrypting key
D. Data encrypting key
Answer» D. Data encrypting key
38.

Which systems use a timestamp?i) Public-Key Certificatesii) Public announcementsiii) Publicly available directoriesiv) Public-Key authority

A. i) and ii)
B. iii) and iv)
C. i) and iv)
D. iv) only
Answer» D. iv) only
39.

CMS stands for

A. cipher message syntax
B. certificate message session
C. cryptographic message syntax
D. none of the mentioned
Answer» D. none of the mentioned
40.

How many handshake rounds are required in the Public-Key Distribution Scenario?

A. 7
B. 5
C. 3
D. 4
Answer» B. 5
41.

CMP stands for

A. cipher message protocol
B. cipher management protocol
C. certificate message protocol
D. none of the mentioned
Answer» E.
42.

How many functions are involved in the PKIX architectural model?

A. 3
B. 5
C. 6
D. 7
Answer» E.
43.

The issuer unique identifier of the X.509 certificates was added in which version?

A. 1
B. 2
C. 3
D. 4
Answer» C. 3
44.

A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other’s public key for future – a technique known as ____

A. time stamping
B. polling
C. caching
D. squeezing
Answer» D. squeezing
45.

For an n-bit tag and a k-bit key, the level of effort required for brute force attack on a MAC algorithm is

A. 2^k
B. 2^n
C. min(2^k,2^n)
D. 2^k/2^n
Answer» D. 2^k/2^n
46.

X.509 certificate recommends which cryptographic algorithm?

A. RSA
B. DES
C. AES
D. Rabin
Answer» B. DES
47.

The period of validity consists of the date on which the certificate expires.

A. True
B. False
C. May be
D. Can't say
Answer» C. May be
48.

What is the value of opad in the HMAC structure?

A. 00111110
B. 00110010
C. 10110110
D. 01011100
Answer» E.
49.

“Conveys any desired X.500 directory attribute values for the subject of this certificate.”Which Extension among the following does this refer to?

A. Subject alternative name
B. Issuer Alternative name
C. Subject directory attributes
D. None of the mentioned
Answer» D. None of the mentioned
50.

Which round provides linear diffusion in the Whirlpool Algorithm?

A. Add Key
B. Substitute Bytes
C. Mix Rows
D. Shift Rows
Answer» D. Shift Rows