Beruflich Dokumente
Kultur Dokumente
1. In brute force attack, on average half of all possible keys must be tried to
achieve success.
a) True
b) False
View Answer
Answer: a
Explanation: In brute force attack the attacker tries every possible key on a
piece of cipher-text until an intelligible translation into plaintext is obtained.
2. If the sender and receiver use different keys, the system is referred to as
conventional cipher system.
a) True
b) False
View Answer
Answer: b
a) KD
b) LD
c) JC
d) MC
View Answer
Answer: a
a) 11
b) 111
c) 101
d) 110
View Answer
Answer: d
5. pi in terms of base 26 is
a) C.DRS
b) D.SQR
c) D.DRS
d) D.DSS
View Answer
6. The time required to convert a k-bit integer to its representation in the
base 10 in terms of big-O notation is
a) O(log2 n)
b) O(log n)
c) O(log2 2n)
d) O(2log n)
View Answer
a) THWOE
b) MPAHT
c) MPJNS
d) THWAE
View Answer
Answer: c
a) 1AD
b) DAD
c) BAD
d) 9AD
View Answer
Answer: d
a) True
b) False
View Answer
Answer: a
a) 308915776
b) 11881376
c) 456976
d) 8031810176
View Answer
Answer: a
Explanation: The required answer is 26^6 = 308915776.
his set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “Substitution and
Transposition Techniques”.
HQFUBSWHG WHAW
a) ABANDONED LOCK
b) ENCRYPTED TEXT
c) ABANDONED TEXT
d) ENCRYPTED LOCK
View Answer
Answer: b
a) Poly-alphabetic Cipher
b) Mono-alphabetic Cipher
c) Multi-alphabetic Cipher
d) Bi-alphabetic Cipher
View Answer
Answer: b
Explanation: Caesar Cipher is an example of Mono-alphabetic cipher, as single alphabets are encrypted
or decrypted at a time.
3. Monoalphabetic ciphers are stronger than Polyalphabetic ciphers because frequency analysis is
tougher on the former.
a) True
b) False
View Answer
Answer: b
Explanation: Monoalphabetic ciphers are easier to break because they reflect the frequency of the
original alphabet.
4. Which are the most frequently found letters in the English language ?
a) e,a
b) e,o
c) e,t
d) e,i
View Answer
Answer: c
Explanation: The relativity frequency of these letters in percent : e-12.702, a-8.167, t-9.056, i-6.996, o-
7.507.
5. Choose from among the following cipher systems, from best to the worst, with respect to ease of
decryption using frequency analysis.
Answer: c
Explanation: Random Polyalphabetic is the most resistant to frequency analysis, followed by Vignere,
Playfair and then Plaintext.
a) abqdnwewuwjphfvrrtrfznsdokvl
b) abqdvmwuwjphfvvyyrfznydokvl
c) tbqyrvmwuwjphfvvyyrfznydokvl
d) baiuvmwuwjphfoeiyrfznydokvl
View Answer
Answer: b
7. On Encrypting “cryptography” using Vignere Cipher System using the keyword “LUCKY” we get cipher
text
a) nlazeiibljji
b) nlazeiibljii
c) olaaeiibljki
d) mlaaeiibljki
View Answer
Answer: a
a) 0.068
b) 0.038
c) 0.065
d) 0.048
View Answer
Answer: c
9. If all letters have the same chance of being chosen, the IC is approximately
a) 0.065
b) 0.035
c) 0.048
d) 0.038
View Answer
Answer: d
Explanation: If all letters have the same chance of being chosen, the IC is approximately 0.038, about
half of the IC for the English language.
4 0 10 25 5 32 24 15 6 11 5 5 1 2 6 6 15 19 10 0 6 28 8 2 3 2
a) 0.065
b) 0.048
c) 0.067
d) 0.042
View Answer
Answer: c
Explanation: Number of letters = 250. From this, IC=0.0676627. This is very strong evidence that the
message came from a Monoalphabetic ciphering scheme.
YJIHX RVHKK KSKHK IQQEV IFLRK QUZVA EVFYZ RVFBX UKGBP KYVVB QTAJK TGBQO ISGHU CWIKX
QUXIH DUGIU LMWKG CHXJV WEKIH HEHGR EXXSF DMIIL UPSLW UPSLW AJKTR WTOWP IVXBW NPTGW
EKBYU SBQWS
Relative Frequencies –
3 7 2 2 5 5 7 9 11 4 14 4 2 1 3 4 6 5 6 5 7 10 9 8 4 2
advertisement
a) 0.065
b) 0.048
c) 0.067
d) 0.044
View Answer
Answer: d
Explanation: Number of letters = 145.From this, IC=0.0438697 .This is very strong evidence that the
message came from a polyalphabetic ciphering scheme.
12. A symmetric cipher system has an IC of 0.041. What is the length of the key ‘m’?
a) 1
b) 3
c) 2
d) 5
View Answer
Answer: d
Explanation: Using the formula for calculating ‘m’ we get m=5, where
m≈0.027n/(I_c (n-1)-0.038n+0.065).
This set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “Block Cipher
Systems”.
a) f(m1) + f(m2) + t
b) f(m1) + f(m2) + 2t
c) f(m1) + t
d) f(m1) + f(m2)
View Answer
Answer: a
Explanation: In general f(∑(i=1 to n) m_i = ∑(i=1 to n) f(m_i) + tδ_n) where δ_n=0 if n is odd and 1 if n is
even.
View Answer
Answer: c
Explanation: In general f(∑(i=1 to n) m_i =∑(i=1 to n) f(m_i ) + tδ_n) where δ_n=0 if n is odd and 1 if n is
even.
3. If the block size is ‘s’, how many affine transformations are possible ?
a) 2s (2s-1)(2s-1)(2s-12)………(2s-1(s-1))
b) 2s (2s-1)(2s-2)(2s-22)………(2s-2(s-2))
c) 2ss (2s-1)(2s-2)(2s-22)………(2s-2(s-1))
d) 2s (2s-1)(2s-2)(2s-22)………(2s-2(s-3))
View Answer
Answer: c
a) 168
b) 840
c) 1024
d) 1344
View Answer
Answer: d
Explanation: Since ‘A’ cannot have columns of ‘0’s. so there are ‘7’ choices i.e.
001/010/011/100/101/110/111. ‘a1’ is chosen for first column of ‘A.
We have ‘6’ choices for second column, let ‘a2’ be chosen for second column.
The final column can be any 3-tuple except 0, a1, a2, a1+a2. That means any one of the remaining ‘4’ 3-
tuples may be chosen for the final column.
(Total number of@ possibilities for A)}=k=7×6×4=168
a) True
b) False
View Answer
Answer: a
where
A_3=A_1 A_2
c_3=A_1 c_2+c_1
This results in another affine transformation, and does not improve the security.
6. If the key is 110100001, the output of the SP network for the plaintext: 101110001 is
a) 110100011
b) 110101110
c) 010110111
d) 011111010
View Answer
Answer: b
Explanation:
cryptography-questions-answers-block-cipher-systems-q6
a) 010110011
b) 111000011
c) 110110111
d) 010110110
View Answer
Answer: a
Explanation:
cryptography-questions-answers-block-cipher-systems-q7
8. Confusion hides the relationship between the ciphertext and the plaintext.
a) True
b) False
View Answer
Answer: b
Explanation: Confusion hides the relationship between the ciphertext and the key.
a) True
b) False
View Answer
Answer: a
Explanation: The S-Box is used to provide confusion, as it is dependent on the unknown key.
The P-Box is fixed, and there is no confusion due to it, but it provides diffusion.
cryptography-questions-answers-block-cipher-systems-q10
advertisement
a) SP Networks
b) Feistel Cipher
c) Hash Algorithm
d) Hill Cipher
View Answer
Answer: b
a) 1 and 3
b) 2 and 3
c) 3 and 4
d) 2 and 4
View Answer
Answer: b
Explanation: Increase in any of the above 4 leads to slowing of the cipher algorithm i.e. more
computational time will be required.
Symmetric Ciphers Questions and Answers – The Data Encryption Standard (DES) and It’s Strength – I
This set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “The Data Encryption
Standard (DES) and It’s Strength”.
1. DES follows
a) Hash Algorithm
b) Caesars Cipher
d) SP Networks
View Answer
2. The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key
a) 12
b) 18
c) 9
d) 16
View Answer
a) 128 Bits
b) 32 Bits
c) 64 Bits
d) 16 Bits
View Answer
4. In the DES algorithm, although the key size is 64 bits only 48bits are used for the encryption
procedure, the rest are parity bits.
a) True
b) False
View Answer
5. In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.
a) 48, 32
b) 64,32
c) 56, 24
d) 32, 32
View Answer
6. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________
c) Addition of zeros
d) Addition of ones
View Answer
b) 12×8
c) 8×8
d) 4×8
View Answer
advertisement
8. The number of unique substitution boxes in DES after the 48 bit XOR operation are
a) 8
b) 4
c) 6
d) 12
View Answer
9. In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring every 4th bit.
a) True
b) False
View Answer