DES follows_________.
1.SP Networks
2.Feistel Cipher Structure
3.Caesars Cipher
4.Hash Algorithm
Posted Date:-2022-07-18 06:01:16
How many round keys are generated in the AES algorithm?
1. 12
2.11
3.10
4.8
Posted Date:-2022-07-18 05:58:00
In AES the 4×4 bytes matrix key is transformed into a keys of size __________.
1. 60 words
2.32 words
3.52 words
4. 44 words
Posted Date:-2022-07-17 12:39:00
In an RSA system the public key of a given user is e = 31, n = 3599. What is the privatekey of this user?
1.1023
2.2432
3.2412
4.3031
Posted Date:-2022-07-18 06:10:37
In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via____________.
1.Addition of ones
2. Addition of zeros
3.Duplication of the existing bits
4.Scaling of the existing bits
Posted Date:-2022-07-18 06:05:04
In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.
1.48, 32
2.32, 32
3.56, 24
4.64,32
Posted Date:-2022-07-18 06:03:56
Perform encryption on the following PT using RSA and find the CT. p = 11; q = 13;M = 7.
1. 78
2.45
3.124
4.25
Posted Date:-2022-07-18 06:19:15
Perform encryption on the following PT using RSA and find the CT. p = 3; q = 11; M= 5.
1.18
2.12
3.26
4.28
Posted Date:-2022-07-18 06:17:15
The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.
1. 16
2.9
3.12
4.18
Posted Date:-2022-07-18 06:02:01
What is the block size in the Simplified AES algorithm?
1.36 bits
2.16 bits
3.40 bits
4. 8 bits
Posted Date:-2022-07-17 12:47:06
Which mode requires the implementation of only the encryption algorithm?
1.OF
2.B CTR
3.CBC
4.ECB
Posted Date:-2022-07-17 12:26:47
Which of the following modes of operation does not involve feedback?
1.OF
2.B CTR
3.CBC
4.ECB
Posted Date:-2022-07-17 12:27:38
. What is the block size in the Simplified AES algorithm?
1. 36 bits
2.16 bits
3.40 bits
4.8 bits
Posted Date:-2022-07-17 12:51:26
By using ______________ you can diminish the chance of data leakage.
1.Steganography
2.Chorography
3.Tomography
4.Cryptography
Posted Date:-2022-07-17 12:23:47
Compute private key (d, p, q) given public key (e=23, n=233 ´ 241=56,153).
1. 32432
2.19367
3.12543
4.35212
Posted Date:-2022-07-18 06:11:27
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Ciphermessage=11 and thus find the plain text.
1.122
2.143
3.111
4.88
Posted Date:-2022-07-18 06:09:53
For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88and thus find the CT.
1.64
2.11
3.64
4.23
Posted Date:-2022-07-18 06:09:16
For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text.
1.5
2.12
3.43
4.54
Posted Date:-2022-07-18 06:16:38
For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 andfind the cipher text.
1.C=23
2. C=56
3.C=92
4. C=80
Posted Date:-2022-07-18 06:15:51
For the AES-128 algorithm there are __________ similar rounds and _________ roundis different.
1.9 ; the last
2. 8 ; the first and last
3.10 ; no
4.2 pair of 5 similar rounds ; every alternate
Posted Date:-2022-07-17 12:41:02
How many computation rounds does the simplified AES consists of?
1.10
2.8
3.2
4.5
Posted Date:-2022-07-17 12:45:17
How many rounds does the AES-192 perform?
1.16
2.12
3.14
4.10
Posted Date:-2022-07-17 12:32:16
How many step function do Round 1 and 2 each have in S-AES?
1.1 and 4
2.3 and 4
3.Both 4
4.4 and 3
Posted Date:-2022-07-17 13:01:08
In RSA, Ф(n) = _______ in terms of p and q.
1.(p+1)(q+1)
2.(p-1)(q-1)
3. (p)(q)
4.(p)/(q)
Posted Date:-2022-07-18 06:14:31
In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?
1.p/q should give no remainder
2.p and q should be prime
3.p and q should be co-prime
4.p and q should be divisible by Ф(n)
Posted Date:-2022-07-18 06:13:33
n = 35; e = 5; C = 10. What is the plaintext (use RSA)?
1.2
2.4
3.5
4.6
Posted Date:-2022-07-18 06:20:24
On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?
1.Permutation P
2.Swapping of halves
3.XOR of subkey with function f
4.F function
Posted Date:-2022-07-17 12:46:12
People will normally think it as a normal/regular file and your secret message will pass on without any _____________
1. Cracking
2.Decryption
3.Suspicion
4.Encryption
Posted Date:-2022-07-17 12:22:56
Perform encryption on the following PT using RSA and find the CT. p = 5; q = 11; M= 9.
1.43
2.14
3.112
4. 54
Posted Date:-2022-07-18 06:17:54
Perform encryption on the following PT using RSA and find the CT. p = 7; q = 11; M= 8.
1.58
2.34
3.123
4.57
Posted Date:-2022-07-18 06:18:30
RSA is also a stream cipher like Merkel-Hellman.
1.True
2.False
3.none
4. all
Posted Date:-2022-07-18 06:12:22
The 4×4 byte matrices in the AES algorithm are called_____
1. Permutations
2.Transitions
3.Words
4.States
Posted Date:-2022-07-17 12:38:12
The DES algorithm has a key length of ______.
1. 16 Bits
2.32 Bits
3.64 Bits
4.128 Bits
Posted Date:-2022-07-18 06:02:55
The Initial Permutation table/matrix is of size _____.
1.4×8
2.8×8
3.12×8
4.16×8
Posted Date:-2022-07-18 06:06:01
The inverse transformation matrix times the forward transformation matrix equals the identity matrix.
1. True
2.False
3.none
4.all
Posted Date:-2022-07-18 05:57:09
The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.
1.Program file
2.Special file
3. Ordinary file
4. Encrypted file
Posted Date:-2022-07-17 12:21:50
The number of unique substitution boxes in DES after the 48 bit XOR operationare___.
1.4
2.8
3.12
4.16
Posted Date:-2022-07-18 06:06:43
The S-Box is used to provide confusion, as it is dependent on the unknown key.
1.True
2.False
3.none
4. all
Posted Date:-2022-07-18 06:08:25
There is an addition of round key before the start of the AES round algorithms.
1.True
2.False
3.none
4.All of the mentioned
Posted Date:-2022-07-17 12:42:07
What is the expanded key size of AES-192?
1.60 words
2.32 words
3.52 words
4.44 words
Posted Date:-2022-07-17 12:32:58
What is the key size in the S-AES algorithm?
1.32 bits
2.24 bits
3. 16 bits
4.None of the mentioned
Posted Date:-2022-07-17 12:52:54
What is the number of possible 3 x 3 affine cipher transformations?
1.840
2.168
3.1344
4.1024
Posted Date:-2022-07-18 06:07:39
Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen asthe AES algorithm?
1.Rijndael
2.RC6
3.Blowfish
4.MARS
Posted Date:-2022-07-17 12:31:23
Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?
1.EC
2.B CB
3.CTR
4.OFB
Posted Date:-2022-07-17 12:25:50
Which mode of operation has the worst “error propagation†among the following?
1. EC
2.B CB
3.CBC
4.OFB
Posted Date:-2022-07-17 12:24:56
Which of the following is a faulty S-AES step function?
1.Mix Columns
2.Add round key
3.Byte substitution
4.Shift rows
Posted Date:-2022-07-17 12:53:43
Which of the following is a natural candidates for stream ciphers?
1.OF
2.B ECB
3.CBC
4.CFB
Posted Date:-2022-07-17 12:28:58
Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?
1. Rijndael
2.Serpent
3.Blowfish
4.JUPITER
Posted Date:-2022-07-17 12:30:41