

MCQOPTIONS
Saved Bookmarks
This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
Calculate the number of subkeys required in RC5 for 18 rounds of computation. |
A. | 40 |
B. | 38 |
C. | 36 |
D. | 34 |
Answer» C. 36 | |
2. |
In RC5, the initialization operations makes use of magic constants defined as follows:P_w=Odd[(e-2) 2w].Q_w=Odd[(φ-1) 2w].What is the hexadecimal value of Qw for word size of 32 bits? |
A. | 9D3779B4 |
B. | 9D7779F9 |
C. | 9E36D9B2 |
D. | 9E3779B9 |
Answer» E. | |
3. |
In RC5, the initialization operations makes use of magic constants defined as follows:P_w=Odd[(e-2) 2w].Q_w=Odd[(φ-1) 2w].What is the hexadecimal value of Pw for word size of 16 bits? |
A. | B7DF |
B. | B7D4 |
C. | B7E1 |
D. | B6E2 |
Answer» D. B6E2 | |
4. |
The value of the golden ratio is |
A. | ᶲ =2.618 |
B. | ᶲ =1.622 |
C. | ᶲ =1.743 |
D. | ᶲ =1.618 |
Answer» E. | |
5. |
The value of the base of natural logarithms is |
A. | e= 2.7073 |
B. | e= 2.7183 |
C. | e= 3.7183 |
D. | e= 1.7273 |
Answer» C. e= 3.7183 | |
6. |
RC5 uses 2 magic constants to define their subkeys. These are |
A. | Base of natural Logarithm and Golden ratio |
B. | Base of natural Logarithm and Pi |
C. | Golden Ratio and Pi |
D. | Pi and Golden Ration |
Answer» B. Base of natural Logarithm and Pi | |
7. |
The number of rounds in RC5 can range from 0 to _____________ |
A. | 127 |
B. | 63 |
C. | 255 |
D. | 31 |
Answer» D. 31 | |
8. |
Which of the following is true for the RC5 algorithm?i) Has variable number of roundsii) Has fixed Key lengthiii) High memory Requirementsiv) Uses only primitive computational operations commonly found on microprocessors |
A. | i) and iv) |
B. | i) ii) and iv) |
C. | iv) |
D. | i) ii) and iii)View Answer |
Answer» B. i) ii) and iv) | |
9. |
THE_VALUE_OF_THE_GOLDEN_RATIO_IS?$ |
A. | ·∂≤ =2.618 |
B. | ·∂≤ =1.622 |
C. | ·∂≤ =1.743 |
D. | ·∂≤ =1.618 |
Answer» D. ¬¨‚àë‚Äö√†√á‚Äö√¢¬ß =1.618 | |
10. |
In RC5, the initialization operations makes use of magic constants defined as follows:$ |
A. | 2<sup>w</sup>]. |
B. | 2<sup>w</sup>]. |
C. | |
Answer» C. | |
11. |
The value of the base of natural logarithms i? |
A. | e= 2.7073 |
B. | e= 2.7183 |
C. | e= 3.7183 |
D. | e= 1.7273 |
Answer» E. | |
12. |
The total number of subkeys t used in the RC5 algorithm is given by the formula (r corresponds to number of rounds) |
A. | t=2r+4 |
B. | t=2r |
C. | t=2r+2 |
D. | t=2r-2 |
Answer» B. t=2r | |
13. |
The standard/nominal version of the RC5-w/r/b has parameters w/r/b as |
A. | 32/18/16 |
B. | 16/18/16 |
C. | 32/12/16 |
D. | 32/16/18 |
Answer» D. 32/16/18 | |
14. |
What are the allowable values of word size in bit for RC5 algorithm? |
A. | 16, 32 |
B. | 16, 32, 64 |
C. | 8, 16, 32 |
D. | 16, 32, 48 |
Answer» D. 16, 32, 48 | |
15. |
i) and iv) |
A. | i) ii) and iv) |
B. | iv) |
C. | i) ii) and iii) |
Answer» C. i) ii) and iii) | |
16. |
Which of the following is true for the RC5 algorithm? |
A. | Has variable number of rounds |
B. | Has fixed Key length |
C. | High memory Requirements |
D. | Uses only primitive computational operations commonly found on microprocessors |
Answer» B. Has fixed Key length | |