Professional Documents
Culture Documents
Quiz 1
Name - LINGGAESWARAN
Student ID: CS01083112
Q2. Which type of cryptography uses a single key for both encryption and decryption?
a. Symmetric cryptography
b. Asymmetric cryptography
c. Quantum cryptography
d. Steganography
Q3. The process of converting plaintext into unreadable scrambling can be called:
a. Decryption
b. Encryption
c. Hashing
d. Encoding
Q4. What type of cryptographic attack enabling an attacker to observe one or more plaintext–ciphertext pairs
that are formed with the secret key. In this attack the attacker also is trying to derive information from the
differences in the ciphertext to reveal the plaintext?
a. Known-Plaintext Attack
b. Brute Force Attack
c. Frequency Analysis
d. Chosen Ciphertext Attack
Q6. What type of cryptographic technique involves replacing each letter in the plaintext with another letter to
maintain the original letter’s position in the alphabet, such as shifting the alphabet by a fixed number of
positions in a Caesar Cipher?
a. Substitution Cipher
b. Transposition Cipher
c. Vigenère Cipher
d. Keyless Transposition Cipher
Q8. Which of the following statements is true about the security of substitution and transposition ciphers?
a. Substitution ciphers are generally more secure than transposition ciphers.
b. Transposition ciphers are generally more secure than substitution ciphers.
c. Both substitution and transposition ciphers are considered highly secure in modern cryptography.
d. Both substitution and transposition ciphers are vulnerable to modern cryptographic attacks and are not
considered secure for protecting sensitive information.
Q9. Encrypt the word: STUDENT with key: UNITEN using Vigenère Cipher. A Table is attached in Appendix 1.
a. NRIVLRL
b. FRKMYEY
c. LFCUUJW
d. MGCWIAN
Q10. Encrypt the following word with Caesar Cipher. Word= I LIKE CRYPTOGRAPHY; Key= +24.
a. M PMOI GVCTXSKVETLC
b. K NKMG ETARVQITCRJA
c. F IFHB ZOVMQLDOXMEV
d. G JGIC APWNRMEPYNFW
Example:
Plaintext: HELLO
Key: H->X, E->Q, L->M, O->A
Encrypted: XQMMA
2. Define a transposition cipher and describe its working principle. Provide one example of a
transposition encryption technique.
A transposition cipher is a method that rearranges the letters of the plaintext in a specific way, without
changing the letters themselves and Transposition ciphers are relatively simple to implement and can
be quite effective against brute-force attacks, but they can be vulnerable to frequency analysis attacks.
One example of a transposition encryption technique is the columnar transposition cipher. which works
by writing the plaintext out in rows and then rearranging the columns in a different order.