You are on page 1of 2

CS8792-CRYPTOGRAPHY AND NETWORK SECURITY

UNIT- 2

Sn. Question Option 1 Option 2 Option 3 Option 4 Correct Option


No.
1 GCD(a,b) = GCD(b,a mod b) TRUE FALSE Cannot be determined none 1
2 All groups satisfy properties G-i to G-v G-i to G-iv G-i to R-v R-i to R-v 3
3 An Abelian Group satisfies the properties G-i to G-v G-i to G-iv G-i to R-v R-i to R-v 1
4 A Ring satisfies the properties R-i to R-v G-i to G-iv G-i to R-v G-i to R-iii 4
5 A Ring is said to be commutative if it also satisfies the property R-vi R-v R-vii R-iv 4
6 An ‘Integral Domain’ satisfies the properties G-i to G-iii G-i to R-v G-i to R-vi G-i to R-iii 3
Does the set of residue classes (mod 3) form a group with respect to modular
7 Yes No Can't say Insufficient Data 1
addition?
For the group Sn of all permutations of n distinct symbols, what is the number of
8 n n-1 2n n! 4
elements in Sn?
9 a(b+c) = ac+bc is the representation for which property? G-ii G-iii R-ii R-iii 4
10 a.(b.c) = (a.b).c is the representation for which property? G-ii G-iii R-ii R-iii 1
11 AES uses a ____________ bit block size and a key size of __________ bits. 128; 128 or 256 64; 128 or 192 256; 128, 192, or 256 128; 128, 192, or 256 4
12 Like DES, AES also uses Feistel Structure. TRUE FALSE Cannot be determined None 2
13 Which one of the following is not a cryptographic algorithm? JUPITER Blowfish Serpent None 1
If the key is 110100001, the output of the SP network for the plaintext:
14 110100011 110101110 10110111 11111010 2
101110001 is
15 What is the number of possible 3 x 3 affine cipher transformations 168 840 1024 1344 4
16 What is the expanded key size of AES-192? 44 words 60 words 52 words 36 words 3
17 In affine block cipher systems if f(m)=Am + t, what is f(m1+m2+m3) ? f(m1) + f(m2) + f(m3) + t f(m1) + f(m2) + f(m3) +2t f(m1) + f(m2) + f(m3) 2(f(m1) + f(m2) + f(m3)) 3
18 The 4×4 byte matrices in the AES algorithm are called States Words Transitions Permutations 1
2s (2s-1)(2s-1)(2s-12) 2s (2s-1)(2s-2)(2s-22) 2ss (2s-1)(2s-2)(2s-22) 2s (2s-1)(2s-2)(2s-22)
19 If the block size is ‘s’, how many affine transformations are possible ? 3
………(2s-1(s-1)) ………(2s-2(s-2)) ………(2s-2(s-1)) ………(2s-2(s-3))
For the AES-128 algorithm there are __________ similar rounds and _________ 2 pair of 5 similar rounds ;
20 9 ; the last 8 ; the first and last 10 ; no 2
round is different. every alternate
The DES Algorithm Cipher System consists of ____________rounds (iterations)
21 9 12 18 16 4
each with a round key
22 DES follows Hash Algorithm Caesars Cipher Feistel Cipher Structure SP Networks 3
23 Every cyclic group is _____. a group with finite order a group with prime order a non Abelian group an Abelian group 4
In the DES algorithm the round key is __________ bit and the Round Input is
24 48, 32 64,32 56, 24 32, 32 1
____________bits
25 _____ is not a binary operation on the set of natural numbers. addition product difference none 3
In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via Duplication of the existing
26 Scaling of the existing bits Addition of zeros Addition of ones 1
____________ bits
27 Which of the following is group under multiplication? Q Q-{0} Q-{1} Q-{0,1} 2
28 The Initial Permutation table/matrix is of size 16×8 4×8 12×8 8×8 4
The number of unique substitution boxes in DES after the 48 bit XOR operation
29 8 4 6 12 1
are
30 The DES algorithm has a key length of 128 Bits 32 Bits 64 Bits 16 Bits 3
31 What is the size of the key in the SDES algorithm? 24 bits 16 bits 20 bits 10 bits 4
32 The Plaintext for the Ciphertext 10100101, given that the key is 0010010111 is 1100111 110110 1001000 1001100 2
33 Assume input 10-bit key, K: 1010000010 for the SDES algorithm. What is K1? 10100100 1011011 1101000 10100111 1
34 Assume input 10-bit key, K: 0010010111 for the SDES algorithm. What is K2? 11101010 11011011 1101000 10101111 1
Which of the following is a mode of operation for the Block ciphers in a. Electronic Code Book Cipher Block Chaining
35 Counter (CTR) mode All of the above 4
cryptography? (ECB) (CBC)

Downloaded from: annauniversityedu.blogspot.com


Which of the following modes of operations can be followed for both stream a. CBC (Cipher Block ECB (Electronic Code a. CFB (Cipher text
36 All of the above 3
ciphers as well as block ciphers? Chaining) Book) Feed Back)
37 The Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is 1100111 1010 11111111 1101101 3
38 Which one of the following RC4 algorithm not used in? SSL TLS FTP WEP 3
39 Till when was the RC4 algorithm kept a secret? 1990 1992 1996 1994 4
40 The Plaintext for the Ciphertext 00100010, given that the key is 1111111111 is 1100111 1010 1001000 1001100 4

Downloaded from: annauniversityedu.blogspot.com

You might also like