Professional Documents
Culture Documents
Roll No:52
Branch:CSE
ASSIGNMENT 01 (2170709)
1. One commonly used public-key cryptography method is the ______ algorithm.
A) RSS
B) RAS
C) RSA
D) RAA
Answer: (C)RSA
Reason:
RSA passes encrypted shared keys for symmetric key cryptography which in turn can
perform bulk encryption-decryption operations at much higher speed.
RSA algorithm was invented by Ron Rivest, Adi Shamir, and Leonard Adleman.
2. A(n) ______ algorithm transforms ciphertext to plaintext.
A) encryption
B) decryption
C) either (a) or (b)
D) neither (a) nor (b)
Answer: (B)decryption
Reason:
Process of Converting plaintext into cyphertext is called encryption, and the process of
converting cyphertext into plaintext is called decryption.
3. The ________ is the message after transformation.
A) Cipher text
B) Plaintext
C) Secret-text
D) none of the above
Answer:(A)Cipher text
Reason:
Ciphertext means the text which is first encrypted. So the message after transformed is
said to be ciphertext.
4. A(n) _______ algorithm transforms plaintext to ciphertext.
A) encryption
B) decryption
C) either (a) or (b)
D) neither (a) nor (b)
Answer:(A)Encryption
Reason:
The algorithm which is used to convert plaintext into ciphertext is Encryption
(ciphertext).
5. The ________ method provides a one-time session key for two parties.
A) Diffie-Hellman
B) RSA
C) DES
D) AES
Answer:(A)Diffie-Hellman
Reason:
InDiffie-Hellman, two parties create a symmetric session key to exchange data without
having to remember or store the key. They do not have to meet to agree on the key, it
can be done online.
6. A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula
to define the relationship between the input stream and the output stream.
A) S-box
B) P-box
C) T-box
D) none of the above
Answer: (A)S-Box
Reason:
An Substitution box (s-box) parallels the traditional substitution cipher for characters.
The input to an S-box is a stream of bits with length N; the result is another stream of
bits with length M.
D) AES
Answer:(D)AES
Reason:
AES is an encryption algorithm. The algorithm was developed by Joan Daemen and
Vincent Rijmen. AES was designed in such a way which supports a block length of 128
bits and key lengths of 128, 192, 256 bits.
A) man-in-the-middle
B) ciphertext attack
C) plaintext attack
D) none of the above
Answer: (A)man-in-the-middle
Reason:
If there is no authentication between sender and receiver then man-in -the -middle can
attack the security.
In ECBmode,The user takes the first block of plaintext and encrypts it with the key to
produce the first block of ciphertext, then takes the second block of plaintext and
follows the same process with same key and so on.
20. A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table
to define the relationship between the input stream and the output stream.
A) S-box
B) P-box
C) T-box
D) none of the above
Answer: (B)P-box
21. ________ DES was designed to increase the size of the DES key.
A) Double
B) Triple
C) Quadruple
D) none of the above
Answer: (B)Triple
Reason:
Triple DES:Two different versions of 3DES are in use: 3DES with two keys and 3DES
with three keys.To make the key size 112 bits and at the same time protect DES from
attacks such as the man-in-the-middle attack, 3DES with two keys was designed. In this
version, the first and the third keys are the same (KeYl = KeY3)' This has the advantage
in that a text encrypted by a single DES block can be decrypted by the new 3DES.
We just set all keys equal to KeYl' Many algorithms use a 3DES cipher with three keys.
This increases the size of the key to 168 bits.
DES uses 48 bit key.
22. ________ is the science and art of transforming messages to make them secure and immune
to attacks.
A) Cryptography
B) Cryptoanalysis
C) either (a) or (b)
D) neither (a) nor (b)
Answer: (A)Cryptography
Reason:
As cryptography states that it is an algorithmic process of converting plain text to cipher
text and cipher text based algorithm that both sender and receiver know so that cipher
text can be converted to its original form (plain text). This algorithm of converting
cipher text to plain text is known as decryption algorithm.
23. DES has an initial and final permutation block and _________ rounds.
A) 14
B) 15
C) 16
D) none of the above
Answer: (C)16
Reason:
DES has two transposition blocks (P-boxes) and 16 complex round ciphers (they are
repeated). Although the 16 iteration round ciphers are conceptually the same, each uses a
different key derived from the original key.
The initial and final permutations are keyless straight permutations that are theinverse of
each other. The permutation takes a 64-bit input and permutes them according to
predefined values.
24. The DES function has _______ components.
A) 2
B) 3
C) 4
D) 5
Answer: (C)4
Reason:
DES function applies 48-bit key to the rightmost 32 bits to produce a 32-bit output.This
function is made up of four operations.
25. In a(n) ________ cipher, the same key is used by both the sender and receiver.
A) symmetric-key
B) asymmetric-key
C) either (a) or (b)
26. _________ ciphers can be categorized into two broad categories: monoalphabetic and
polyalphabetic.
A) Substitution
B) Transposition
C) either (a) or (b)
D) neither (a) nor (b)
Answer: (A)Substitution
Reason:
In a monoalphabetic cipher, a character in the plaintext is alwayschanged to the same
character in the ciphertext regardless of its position inthe text. For example, if the
algorithm says that character A in the plaintext is changed to character D, every
character A is changed to character D. In other words, the relationship between
characters in the plaintext and the ciphertext is a one-to-one relationship
In a polyalphabetic cipher, each occurrence of a character can have a different substitute.
In both the cipher techniques character are replaced by another ,so they are characterized
under Substitution technique.
27. The _______ cipher is the simplest monoalphabetic cipher. It uses modular arithmetic with a
modulus of 26.
A) transposition
B) additive
C) shift
D) none of the above
Answer: (C)Shift
Reason:
As in monoalphabetic cipher,the character is replaced by the same character in plain text
regardless of its position in the text.In monoalphabetic technique we assign the character
one character regardless of it.Example A can be replaced by D and B can be replaced by
X,etc.
28. In an asymmetric-key cipher, the sender uses the__________ key.
A) private
B) public
C) either (a) or (b)
D) neither (a) nor (b)
Answer: (B)Public
Reason:
In assymetric key cipher , different key is used for encryption and decryption algorithm
and is known as public keyS.