You are on page 1of 5

‫ﻫﻼل ﺳﻌﻮد ﻣﺤﻤﺪ اﻟﻐﺎﻣﺪي‬

10
‫ﱢ‬
‫اﻟﻤﺆﻗﺖ‬ ‫إﻇﻬﺎر‬

‫أدﻟﺔ راﻓﺪ‬ ‫اﻟﺮﺋﻴﺴﻴﺔ‬


:‫ﺣﺎﻟﺔ إﻛﻤﺎل اﻷﺳﺌﻠﺔ‬

‫؟‬ Midterm Re-Exam :‫إﺟﺮاء اﻻﺧﺘﺒﺎر‬ ‫اﻟﻤﺤﺘﻮى‬ Intro to Cryptography_26344

Midterm Re-Exam :‫إﺟﺮاء اﻻﺧﺘﺒﺎر‬

‫ﻣﻌﻠﻮﻣﺎت اﻻﺧﺘﺒﺎر‬

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬0.5 1 ‫اﻟﺴﺆال‬

.ECB stands for Electronic chaining block


‫ﺻﻮاب‬

‫ﺧﻄﺄ‬

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬0.5 2 ‫اﻟﺴﺆال‬

.RC4 algorithm is used in GSM cell phones


‫ﺻﻮاب‬

‫ﺧﻄﺄ‬

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬0.5 3 ‫اﻟﺴﺆال‬

.DES is not a Fiestel cipher with 16 rounds


‫ﺻﻮاب‬

‫ﺧﻄﺄ‬

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬0.5 4 ‫اﻟﺴﺆال‬

The brute force approach of trying all possible keys until we stumble across the correct one is known
as key exhaustive search.
‫ﺻﻮاب‬

‫ﺧﻄﺄ‬

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬0.5 5 ‫اﻟﺴﺆال‬

.There is an addition of round key before the start of the AES round algorithms
‫ﺻﻮاب‬

‫ﺧﻄﺄ‬

.‫ واﻧﻘﺮ ﻓﻮق "ﺣﻔﻆ ﻛﻞ اﻹﺟﺎﺑﺎت" ﻟﺤﻔﻆ ﻛﻞ اﻹﺟﺎﺑﺎت‬.‫اﻧﻘﺮ ﻓﻮق "ﺣﻔﻆ وإرﺳﺎل" ﻟﻠﺤﻔﻆ واﻹرﺳﺎل‬
‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬0.5 6 ‫اﻟﺴﺆال‬

‫ﺣﻔﻆ وإرﺳﺎل‬ ‫ﺣﻔﻆ ﻛﺎﻓﺔ اﻹﺟﺎﺑﺎت‬


Stream ciphers are based on codebook.
‫ﺻﻮاب‬
‫ﺻﻮاب‬
‫ﱢ‬
‫اﻟﻤﺆﻗﺖ‬ ‫إﻇﻬﺎر‬
‫ﺧﻄﺄ‬

:‫ﺣﺎﻟﺔ إﻛﻤﺎل اﻷﺳﺌﻠﺔ‬

7 ‫اﻟﺴﺆال‬
‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1

Which of the following statement is incorrect?


.In the world wide web, primarily symmetric Encryption is used

.PGP uses combined encryption

Symmetric encryption is applied in the transmission of PIN numbers from the EC automat to the
.server of the bank for example

Symmetric cipher is used for validations to confirm that the sender of a message is who he claims
.to be

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 8 ‫اﻟﺴﺆال‬

Asymmetric key is also called _____________.

.Public key

.Private key

.Secret key

.None of the above

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 9 ‫اﻟﺴﺆال‬

.______________ The process to discover plain text or key is known as

.Cryptographic

.Crypto processing

.Cryptanalysis

.Crypto design

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 10 ‫اﻟﺴﺆال‬

.__________ The input block length in AES is

.bits 112

.bits 128

.bits 56

.bits 64

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 11 ‫اﻟﺴﺆال‬

?”Which of the following is the art and science of making and breaking “secret codes
.None of the mentioned

.Cryptography

.Cryptanalysis

.Cryptology
.‫ واﻧﻘﺮ ﻓﻮق "ﺣﻔﻆ ﻛﻞ اﻹﺟﺎﺑﺎت" ﻟﺤﻔﻆ ﻛﻞ اﻹﺟﺎﺑﺎت‬.‫اﻧﻘﺮ ﻓﻮق "ﺣﻔﻆ وإرﺳﺎل" ﻟﻠﺤﻔﻆ واﻹرﺳﺎل‬

‫ﺣﻔﻆ وإرﺳﺎل‬ ‫ﺣﻔﻆ ﻛﺎﻓﺔ اﻹﺟﺎﺑﺎت‬

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 12 ‫اﻟﺴﺆال‬


‫ﻢ‬ ‫ درﺟﺎت‬1 12 ‫اﻟﺴﺆال‬
‫ﱢ‬
‫اﻟﻤﺆﻗﺖ‬ ‫إﻇﻬﺎر‬

?”Which of the following is the making of “secret codes


:‫ﺣﺎﻟﺔ إﻛﻤﺎل اﻷﺳﺌﻠﺔ‬
.Cryptography

.Cryptology

.None of the mentioned

.Cryptanalysis

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 13 ‫اﻟﺴﺆال‬

The Advanced Encryption Standard (AES), has three different configurations with respect to the
._______________ number of rounds and

.Round size

.Data size

.Key size

.Encryption size

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 14 ‫اﻟﺴﺆال‬

?Which of the 4 operations are false for each round in the AES algorithm
i) Substitute Bytes
ii) Shift Columns
iii) Mix Rows
iv) XOR Round Key

.(Only i

.(ii) and iii

.(only iv

.(ii) iii) and iv

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 15 ‫اﻟﺴﺆال‬

.___________ The 4×4 byte matrices in the AES algorithm are called

.States

.Permutations

.Words

.Transitions

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 16 ‫اﻟﺴﺆال‬

Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES
?algorithm

.MARS

.Rijndael

.RC6

.Blowfish
.‫ واﻧﻘﺮ ﻓﻮق "ﺣﻔﻆ ﻛﻞ اﻹﺟﺎﺑﺎت" ﻟﺤﻔﻆ ﻛﻞ اﻹﺟﺎﺑﺎت‬.‫اﻧﻘﺮ ﻓﻮق "ﺣﻔﻆ وإرﺳﺎل" ﻟﻠﺤﻔﻆ واﻹرﺳﺎل‬

‫ﺣﻔﻆ وإرﺳﺎل‬ ‫ﺣﻔﻆ ﻛﺎﻓﺔ اﻹﺟﺎﺑﺎت‬


‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 17 ‫اﻟﺴﺆال‬
‫ﱢ‬
‫اﻟﻤﺆﻗﺖ‬ ‫إﻇﻬﺎر‬
?Which of the following is designed for hardware

.Block cipher
:‫ﺣﺎﻟﺔ إﻛﻤﺎل اﻷﺳﺌﻠﺔ‬

.RC4

.A5/1

.DES

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 18 ‫اﻟﺴﺆال‬

?Which of the following is optimized for software implementation


.Fiestel cipher

.A5/1

.RC4

.DES

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 19 ‫اﻟﺴﺆال‬

.AES uses a ____________ bit block size and a key size of __________ bits

.or 256 ,192 ,128 ;256

.or 192 128 ;64

.or 256 ,192 ,128 ;128

.or 256 128 ;128

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 20 ‫اﻟﺴﺆال‬

?In AES Algorithm, what is the Shifted Row transformation for the matrix bellow
D7 AF FE 30
FE 72 2B D7
6B 77 A4 6B
AD 01 F0 63

D7 AF FE 30

2B D7 FE 72

A4 6B 6B 77

AD 01 F0 63

2B D7 FE 72

A4 6B 6B 77

AD 01 F0 63

D7 AF FE 30

D7 FE 72 2B

A4 6B 6B 77

AD 63 F0 01

D7 AF FE 30

FE 72 2B D7

6B 77 A4 6B
.‫ واﻧﻘﺮ ﻓﻮق "ﺣﻔﻆ ﻛﻞ اﻹﺟﺎﺑﺎت" ﻟﺤﻔﻆ ﻛﻞ اﻹﺟﺎﺑﺎت‬.‫اﻧﻘﺮ ﻓﻮق "ﺣﻔﻆ وإرﺳﺎل" ﻟﻠﺤﻔﻆ واﻹرﺳﺎل‬
AD 01 F0 63

D7 AF FE 30
‫ﺣﻔﻆ وإرﺳﺎل‬ ‫ﺣﻔﻆ ﻛﺎﻓﺔ اﻹﺟﺎﺑﺎت‬
‫ﱢ‬
‫اﻟﻤﺆﻗﺖ‬ ‫إﻇﻬﺎر‬
‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 21 ‫اﻟﺴﺆال‬
:‫ﺣﺎﻟﺔ إﻛﻤﺎل اﻷﺳﺌﻠﺔ‬
?=mod 7 5/4

.2

.4

.5

.3

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 22 ‫اﻟﺴﺆال‬

?Which of the following value is true for n, where n acts as the substitution
.Plaintext: abcdefghIjklmnopqrstuvwxyz
.Ciphertext: e f g h I j k l m n o p q r s t u v w x y z a b c d

.4

.1

.2

.3

‫ﺗﻢ اﻟﺤﻔﻆ‬ ‫ درﺟﺎت‬1 23 ‫اﻟﺴﺆال‬

?Which of the following is not correct

.(mod7)6≡6−1

.(mod7)3≡2−1

.(mod7)2≡4−1

.(mod7)3≡5−1

.‫ واﻧﻘﺮ ﻓﻮق "ﺣﻔﻆ ﻛﻞ اﻹﺟﺎﺑﺎت" ﻟﺤﻔﻆ ﻛﻞ اﻹﺟﺎﺑﺎت‬.‫اﻧﻘﺮ ﻓﻮق "ﺣﻔﻆ وإرﺳﺎل" ﻟﻠﺤﻔﻆ واﻹرﺳﺎل‬

‫ﺣﻔﻆ وإرﺳﺎل‬ ‫ﺣﻔﻆ ﻛﺎﻓﺔ اﻹﺟﺎﺑﺎت‬

You might also like