Explore topic-wise MCQs in Symmetric Ciphers.

This section includes 12 Mcqs, each offering curated multiple-choice questions to sharpen your Symmetric Ciphers knowledge and support exam preparation. Choose a topic below to get started.

1.

Which of the following is not a valid design parameter to be considered in designing stream ciphers?

A. Keystream should be truly as random as possible
B. Encryption sequence should have a large value
C. Output of the PRNG (the key) should be sufficiently large
D. All of the mentioned are valid points that should be considered while designing stream cipher blocks
Answer» E.
2.

With reference to stream ciphers, the output of the generator is called

A. Byte Stream
B. Re-Seed Interval
C. Key Length
D. Keystream
Answer» E.
3.

The Generate function precedes the Update phase in CTR_DRBG.

A. True
B. False
Answer» B. False
4.

What is the Seed length (seedlen) length for 3DES?

A. 284
B. 260
C. 232
D. 216
Answer» D. 216
5.

What is the Seed length (seedlen) length for AES-192 ?

A. 428
B. 384
C. 320
D. 512
Answer» D. 512
6.

The CTR mode uses a Key K and an Initial Vector V. The Intel Digital Random Number generator has these values initially as

A. K = 0 ; V = 1
B. K = 0 ; V = 0
C. K = 1 ; V = 1
D. K = 1 ; V = 0
Answer» C. K = 1 ; V = 1
7.

For the NIST CTR_DRBG , Seed length =

A. Output Block Length
B. Reseed Interval
C. Reseed Interval + Output Block Length
D. Output Block Length + Key Length
Answer» E.
8.

Which of the following PRNGs is used in most recent Intel Chips?

A. ANSI X9.17 PRNG
B. NIST CTR_DRBG
C. ANSI standard X9.82
D. None of the mentioned
Answer» C. ANSI standard X9.82
9.

How many DES encryptions take place in the ANSI X9.17 PRNG?

A. 3
B. 6
C. 9
D. 12
Answer» E.
10.

How many 3DES blocks are present in the ANSI X9.17 PRNG?

A. 2
B. 3
C. 4
D. 5
Answer» C. 4
11.

ANSI X9.17 uses a seed of size

A. 56 bits
B. 64 bits
C. 32 bits
D. 128 bits
Answer» C. 32 bits
12.

Which mode is less prone to decryption : PRNG using CTR / PRNG using OFB?

A. OFB
B. CTR
C. Both are equally prone
D. Both can t be decrypted
Answer» C. Both are equally prone