Here, we have a set of multiple-choice questions and answers (quiz) on ciphers in Cryptography (basic concepts of Cryptography Techniques and different types of ciphers).

questions

Title
The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?

The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?


  1. The input text is divided into two parts: one being left half and another one being right half.
  2. Swapping of the left and right halves are performed after each round.
  3. The plain text is converted into a matrix form first
  4. None of the above
discuss
Among the following given options, chose the strongest encryption technique?

Among the following given options, chose the strongest encryption technique?


  1. DES ( Data Encryption Standard)
  2. Double DES
  3. Triple DES
  4. AES (Advance Encryption Standard)
discuss
What is the full-form of RSA in the RSA encryption technique?

What is the full-form of RSA in the RSA encryption technique?


  1. Round Security Algorithm
  2. Rivest, Shamir, Adleman
  3. Robert, Shamir, Addie
  4. None of the above
discuss
The above steps are performed in each round of which of the following ciphers?

Consider the following steps,

  1. Substitution bytes
  2. Shift Rows
  3. Mix columns
  4. Add round key

The above steps are performed in each round of which of the following ciphers?


  1. Rail fence cipher
  2. Data Encryption Standard (DES)
  3. Advance Encryption Standard (AES)
  4. None of the above
discuss
Codes and ciphers are different ways to _____ a message

Codes and ciphers are different ways to _____ a message.


  1. Encrypt
  2. Decrypt
  3. Both A and B
  4. All of the mentioned above
discuss
_____ ciphers encrypt uniformly sized blocks of data

_____ ciphers encrypt uniformly sized blocks of data.


  1. Set
  2. Block
  3. Rack
  4. All of the mentioned above
discuss
Images can also be encrypted in sentences,

Images can also be encrypted in sentences,


  1. True
  2. False
discuss
Decryption is a process to unveil the ______

Decryption is a process to unveil the ______.


  1. Unsecured data
  2. Secured data
  3. Insecure
  4. None of the mentioned above
discuss
Symmetric encryption gathers plain-text data and then shuffles it to make it unreadable

Symmetric encryption gathers plain-text data and then shuffles it to make it unreadable.


  1. True
  2. False
discuss
You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,

You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,

A = [ 4 2 2 1 ]

Is the given matrix 'A', a valid key to be used for encryption?


  1. Yes
  2. No
  3. Can't be determined
  4. Data insufficient
discuss
You are supposed to use hill cipher for encryption technique. You are provided with the following matrix, A = [ 4 2 2 1 ] Is the given matrix 'A', a valid key to be used for encryption?

You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,

A = [ 4 2 2 1 ]

Is the given matrix 'A', a valid key to be used for encryption?

 


  1. Yes
  2. No
  3. Can't be determined
  4. Data insufficient
discuss
total MCQs: 11

MCQs

11

Views

36

Best Answers

299

Points

5