Here, we have a set of multiple-choice questions and answers (quiz) on ciphers in Cryptography (basic concepts of Cryptography Techniques and different types of ciphers).

questions

Title
We are provided the plain text “SUN”. You need to convert the given plain text into ciphertext under the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the given text if the key is 2?

We are provided the plain text “SUN”. You need to convert the given plain text into ciphertext under the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the given text if the key is 2?


  1. UWP
  2. NUS
  3. WUP
  4. QSL
discuss
Which of the following cannot be chosen as a key in the Caesar cipher?

Which of the following cannot be chosen as a key in the Caesar cipher?


  1. An integer
  2. An alphabet (A-Z or a-z)
  3. A string
  4. None of the above
discuss
Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?

Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?


  1. Hill Cipher
  2. Playfair cipher
  3. Both a and b
  4. None of the above
discuss
Which of the following ciphers is a block cipher?

Which of the following ciphers is a block cipher?


  1. Caesar cipher
  2. Vernam cipher
  3. Playfair cipher
  4. None of the above
discuss
Which of the following ciphers uses asymmetric key cryptography?

Which of the following ciphers uses asymmetric key cryptography?


  1. Rail Fence Cipher
  2. Data Encryption Standard (DES)
  3. Diffie Hellman Cipher
  4. None of the above
discuss
"Cipher" is synonymous with "code",

"Cipher" is synonymous with "code",


  1. True
  2. False
discuss
Block ciphers accumulate symbols in a message of a ______

Block ciphers accumulate symbols in a message of a ______.


  1. Fixed size
  2. Variable
  3. Integration
  4. All of the mentioned above
discuss
With symmetric key algorithms, the ____ key is used for the encryption and decryption of data

With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.


  1. Different
  2. Same
  3. Both A and B
  4. None of the mentioned above
discuss
____ is the message or data that can be readable by the sender

____ is the message or data that can be readable by the sender.


  1. Edited
  2. Main Text
  3. Plain text
  4. All of the mentioned above
discuss
In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______

In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.


  1. Passcode or a password
  2. Developed code
  3. Network set
  4. None of the mentioned above
discuss
You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,

You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,

A = [ 4 2 2 1 ]

Is the given matrix 'A', a valid key to be used for encryption?


  1. Yes
  2. No
  3. Can't be determined
  4. Data insufficient
discuss
total MCQs: 11

MCQs

11

Views

32

Best Answers

299

Points

5