Explore topic-wise MCQs in Cryptography and Network Security.

This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Calculate the number of subkeys required in RC5 for 18 rounds of computation.

A. 40
B. 38
C. 36
D. 34
Answer» C. 36
2.

In RC5, the initialization operations makes use of magic constants defined as follows:P_w=Odd[(e-2) 2w].Q_w=Odd[(φ-1) 2w].What is the hexadecimal value of Qw for word size of 32 bits?

A. 9D3779B4
B. 9D7779F9
C. 9E36D9B2
D. 9E3779B9
Answer» E.
3.

In RC5, the initialization operations makes use of magic constants defined as follows:P_w=Odd[(e-2) 2w].Q_w=Odd[(φ-1) 2w].What is the hexadecimal value of Pw for word size of 16 bits?

A. B7DF
B. B7D4
C. B7E1
D. B6E2
Answer» D. B6E2
4.

The value of the golden ratio is

A. ᶲ =2.618
B. ᶲ =1.622
C. ᶲ =1.743
D. ᶲ =1.618
Answer» E.
5.

The value of the base of natural logarithms is

A. e= 2.7073
B. e= 2.7183
C. e= 3.7183
D. e= 1.7273
Answer» C. e= 3.7183
6.

RC5 uses 2 magic constants to define their subkeys. These are

A. Base of natural Logarithm and Golden ratio
B. Base of natural Logarithm and Pi
C. Golden Ratio and Pi
D. Pi and Golden Ration
Answer» B. Base of natural Logarithm and Pi
7.

The number of rounds in RC5 can range from 0 to _____________

A. 127
B. 63
C. 255
D. 31
Answer» D. 31
8.

Which of the following is true for the RC5 algorithm?i) Has variable number of roundsii) Has fixed Key lengthiii) High memory Requirementsiv) Uses only primitive computational operations commonly found on microprocessors

A. i) and iv)
B. i) ii) and iv)
C. iv)
D. i) ii) and iii)View Answer
Answer» B. i) ii) and iv)
9.

THE_VALUE_OF_THE_GOLDEN_RATIO_IS?$

A. ·∂≤ =2.618
B. ·∂≤ =1.622
C. ·∂≤ =1.743
D. ·∂≤ =1.618
Answer» D. ¬¨‚àë‚Äö√†√á‚Äö√¢¬ß =1.618
10.

In RC5, the initialization operations makes use of magic constants defined as follows:$

A. 2<sup>w</sup>].
B. 2<sup>w</sup>].
C.
Answer» C.
11.

The value of the base of natural logarithms i?

A. e= 2.7073
B. e= 2.7183
C. e= 3.7183
D. e= 1.7273
Answer» E.
12.

The total number of subkeys t used in the RC5 algorithm is given by the formula (r corresponds to number of rounds)

A. t=2r+4
B. t=2r
C. t=2r+2
D. t=2r-2
Answer» B. t=2r
13.

The standard/nominal version of the RC5-w/r/b has parameters w/r/b as

A. 32/18/16
B. 16/18/16
C. 32/12/16
D. 32/16/18
Answer» D. 32/16/18
14.

What are the allowable values of word size in bit for RC5 algorithm?

A. 16, 32
B. 16, 32, 64
C. 8, 16, 32
D. 16, 32, 48
Answer» D. 16, 32, 48
15.

i) and iv)

A. i) ii) and iv)
B. iv)
C. i) ii) and iii)
Answer» C. i) ii) and iii)
16.

Which of the following is true for the RC5 algorithm?

A. Has variable number of rounds
B. Has fixed Key length
C. High memory Requirements
D. Uses only primitive computational operations commonly found on microprocessors
Answer» B. Has fixed Key length