You are on page 1of 12

Name: Vidhi Abhaykumar Desai

Roll No:52
Branch:CSE
ASSIGNMENT 01 (2170709)
1. One commonly used public-key cryptography method is the ______ algorithm.
A) RSS
B) RAS
C) RSA
D) RAA
Answer: (C)RSA
Reason:
RSA passes encrypted shared keys for symmetric key cryptography which in turn can
perform bulk encryption-decryption operations at much higher speed.
RSA algorithm was invented by Ron Rivest, Adi Shamir, and Leonard Adleman.
2. A(n) ______ algorithm transforms ciphertext to plaintext.
A) encryption
B) decryption
C) either (a) or (b)
D) neither (a) nor (b)
Answer: (B)decryption
Reason:
Process of Converting plaintext into cyphertext is called encryption, and the process of
converting cyphertext into plaintext is called decryption.
3. The ________ is the message after transformation.
A) Cipher text
B) Plaintext
C) Secret-text
D) none of the above

Answer:(A)Cipher text
Reason:
Ciphertext means the text which is first encrypted. So the message after transformed is
said to be ciphertext.
4. A(n) _______ algorithm transforms plaintext to ciphertext.
A) encryption
B) decryption
C) either (a) or (b)
D) neither (a) nor (b)
Answer:(A)Encryption
Reason:
The algorithm which is used to convert plaintext into ciphertext is Encryption
(ciphertext).

5. The ________ method provides a one-time session key for two parties.
A) Diffie-Hellman
B) RSA
C) DES
D) AES
Answer:(A)Diffie-Hellman
Reason:
InDiffie-Hellman, two parties create a symmetric session key to exchange data without
having to remember or store the key. They do not have to meet to agree on the key, it
can be done online.
6. A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula
to define the relationship between the input stream and the output stream.
A) S-box
B) P-box
C) T-box
D) none of the above
Answer: (A)S-Box
Reason:

An Substitution box (s-box) parallels the traditional substitution cipher for characters.
The input to an S-box is a stream of bits with length N; the result is another stream of
bits with length M.

7. A ________ cipher replaces one character with another character.


A) substitution
B) transposition
C) either (a) or (b)
D) neither (a) nor (b)
Answer:(A)Substitution
Reason:
In substitution technique in which letters of plaintext is replaced by other letters or
special characters.
Example: Caesar Cipher, Monoalphabetic Cipher ,etc.
8. The ________ cipher reorders the plaintext characters to create a ciphertext.
A) Substitution
B) Transposition
C) either (a) or (b)
D) neither (a) nor (b)
Answer:(B)Transposition
Reason:
Transposition technique is one in which the letters are reordered to convert plain text to
cipher text.
Example: Rail fence.
9. _______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
A) AEE
B) AED
C) AER

D) AES
Answer:(D)AES
Reason:
AES is an encryption algorithm. The algorithm was developed by Joan Daemen and
Vincent Rijmen. AES was designed in such a way which supports a block length of 128
bits and key lengths of 128, 192, 256 bits.

10. The ________is the original message before transformation.


A) ciphertext
B) plaintext
C) secret-text
D) none of the above
Answer:(B)Plaintext
Reason:
Plaintext is message before transformation which is also called as original message.
11. A modern cipher is usually a complex _____cipher made of a combination of different
simple ciphers.
A) round
B) circle
C) square
D) none of the above
Answer:(A)Round
Reason:
Todays ciphers are usually round cipher because there are multiple rounds. where each
round is a complex cipher made up of the simple ciphers.described. The key used in
each round is a subset or variation of the general key called the round key. If the cipher
has N rounds, a key generator produces N keys, Kb Kz, ..., Kn,where K1 is used in round
1, K2 in round 2, and so on.
12. The _________ attack can endanger the security of the Diffie-Hellman method if two parties
are not authenticated to each other.

A) man-in-the-middle
B) ciphertext attack
C) plaintext attack
D) none of the above
Answer: (A)man-in-the-middle
Reason:
If there is no authentication between sender and receiver then man-in -the -middle can
attack the security.

13. A combination of an encryption algorithm and a decryption algorithm is called a ________.


A) cipher
B) secret
C) key
D) none of the above
Answer: (A)Cipher
Reason:
Encryption and decryption algorithm are made to text transfer information in secret way
so that its combination is called cipher.
14. In an asymmetric-key cipher, the receiver uses the ______ key.
A) private
B) public
C) either a or b
D) neither (a) nor (b)
Answer: (B)Public
Reason:
In asymmetric cipher, key that is used for encryption and the key that is usedfor
decryption are different and known the key is known as public key.

15. AES has _____ different configurations.


A) two
B) three
C) four
D) five
Answer:(B)three
Reason:
AES has three different configurations with respectto the number of rounds and key size
: 128, 192, or 256 bits.

16. DES is a(n) ________ method adopted by the U.S. government.


A) symmetric-key
B) asymmetric-key
C) either (a) or (b)
D) neither (a) nor (b)
Answer: (A)symmetric-key
Reason:
DES was designed by IBM and adopted by the U.S. government as the standard
encryption method.
17. DES uses a key generator to generate sixteen _______ round keys.
A) 32-bit
B) 48-bit
C) 54-bit
D) 42-bit
Answer: (B)48-bit
18. The Caesar cipher is a _______cipher that has a key of 3.
A) transposition
B) additive
C) shift
D) none of the above
Answer: (C)shift
Reason:
Technique of caesar cipher states, plain text is converted to cipher text by replacing
letter with shifting of 3 letters. (value of key is 3)
19. ECB and CBC are ________ ciphers.
A) block
B) stream
C) field
D) none of the above
Answer: (A)block
Reason:

In ECBmode,The user takes the first block of plaintext and encrypts it with the key to
produce the first block of ciphertext, then takes the second block of plaintext and
follows the same process with same key and so on.
20. A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table
to define the relationship between the input stream and the output stream.
A) S-box
B) P-box
C) T-box
D) none of the above
Answer: (B)P-box
21. ________ DES was designed to increase the size of the DES key.
A) Double
B) Triple
C) Quadruple
D) none of the above
Answer: (B)Triple
Reason:
Triple DES:Two different versions of 3DES are in use: 3DES with two keys and 3DES
with three keys.To make the key size 112 bits and at the same time protect DES from
attacks such as the man-in-the-middle attack, 3DES with two keys was designed. In this
version, the first and the third keys are the same (KeYl = KeY3)' This has the advantage
in that a text encrypted by a single DES block can be decrypted by the new 3DES.
We just set all keys equal to KeYl' Many algorithms use a 3DES cipher with three keys.
This increases the size of the key to 168 bits.
DES uses 48 bit key.

22. ________ is the science and art of transforming messages to make them secure and immune
to attacks.
A) Cryptography
B) Cryptoanalysis
C) either (a) or (b)
D) neither (a) nor (b)

Answer: (A)Cryptography
Reason:
As cryptography states that it is an algorithmic process of converting plain text to cipher
text and cipher text based algorithm that both sender and receiver know so that cipher
text can be converted to its original form (plain text). This algorithm of converting
cipher text to plain text is known as decryption algorithm.

23. DES has an initial and final permutation block and _________ rounds.
A) 14
B) 15
C) 16
D) none of the above
Answer: (C)16
Reason:
DES has two transposition blocks (P-boxes) and 16 complex round ciphers (they are
repeated). Although the 16 iteration round ciphers are conceptually the same, each uses a
different key derived from the original key.
The initial and final permutations are keyless straight permutations that are theinverse of
each other. The permutation takes a 64-bit input and permutes them according to
predefined values.
24. The DES function has _______ components.
A) 2
B) 3
C) 4
D) 5
Answer: (C)4
Reason:
DES function applies 48-bit key to the rightmost 32 bits to produce a 32-bit output.This
function is made up of four operations.
25. In a(n) ________ cipher, the same key is used by both the sender and receiver.
A) symmetric-key
B) asymmetric-key
C) either (a) or (b)

D) neither (a) nor (b)


Answer: (A)Symmetric-key
Reason:
Symmetric cipher uses same key for encryption and decryption and is known as secret
key.

26. _________ ciphers can be categorized into two broad categories: monoalphabetic and
polyalphabetic.
A) Substitution
B) Transposition
C) either (a) or (b)
D) neither (a) nor (b)
Answer: (A)Substitution
Reason:
In a monoalphabetic cipher, a character in the plaintext is alwayschanged to the same
character in the ciphertext regardless of its position inthe text. For example, if the
algorithm says that character A in the plaintext is changed to character D, every
character A is changed to character D. In other words, the relationship between
characters in the plaintext and the ciphertext is a one-to-one relationship
In a polyalphabetic cipher, each occurrence of a character can have a different substitute.
In both the cipher techniques character are replaced by another ,so they are characterized
under Substitution technique.
27. The _______ cipher is the simplest monoalphabetic cipher. It uses modular arithmetic with a
modulus of 26.
A) transposition
B) additive
C) shift
D) none of the above
Answer: (C)Shift

Reason:
As in monoalphabetic cipher,the character is replaced by the same character in plain text
regardless of its position in the text.In monoalphabetic technique we assign the character
one character regardless of it.Example A can be replaced by D and B can be replaced by
X,etc.
28. In an asymmetric-key cipher, the sender uses the__________ key.
A) private
B) public
C) either (a) or (b)
D) neither (a) nor (b)
Answer: (B)Public
Reason:
In assymetric key cipher , different key is used for encryption and decryption algorithm
and is known as public keyS.

29. In a(n) ________ cipher, a pair of keys is used.


A) symmetric-key
B) asymmetric-key
C) either (a) or (b)
D) neither (a) nor (b)
Answer: (B)Asymmetric-key
Reason:
In assymetric key cipher, different key is used for encryption and decryption algorithm
and is known as public key.So,in assymetric key cipher pairof keys are used
30. The _______ is a number or a set of numbers on which the cipher operates.
A) cipher
B) secret
C) key
D) none of the above
Answer: (C)key
Reason:
As plain text is converted to cipher text using some key.

31. In a(n) ________, the key is called the secret key.


A) symmetric-key
B) asymmetric-key
C) either (a) or (b)
D) neither (a) nor (b)
Answer:(A)Symmetric key
Reason:
The key which is used for both encryption and decryption is called secret key.

You might also like