Here, we have a set of multiple-choice questions and answers (quiz) on Cryptography Techniques of Block Cipher.

questions

Title
What is the block size of plain text in SHA- 512 algorithm?

What is the block size of plain text in SHA- 512 algorithm?


  1. 512 bits
  2. 1024 bits
  3. 2048 bits
  4. None of the above
discuss
All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?

All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?

  1. Substitution bytes
  2. Shift rows
  3. Mix columns
  4. Add round key

  1. i.
  2. iii.
  3. All of the mentioned
  4. None of the mentioned
discuss
What does IDEA stand for in the world of cryptography? or The IDEA word in the IDEA algorithm is the abbreviation for which of the following?

What does IDEA stand for in the world of cryptography?

or

The IDEA word in the IDEA algorithm is the abbreviation for which of the following?


  1. Independent Decryption Environment Analysis
  2. International Defense Encryption Area
  3. International Data Encryption Algorithm
  4. None of the above
discuss
How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?

How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?


  1. 64 sub- keys
  2. 48 sub- keys
  3. 52 sub- keys
  4. Only one key and no subkeys
discuss
"The number of rounds in the AES algorithm depends upon the key size being used." Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?

"The number of rounds in the AES algorithm depends upon the key size being used."

Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?


  1. 128 key size: 10 rounds
  2. 192 key size: 12 rounds
  3. 256 key size: 14 rounds
  4. All of the above
discuss
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?

Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?


  1. Avalanche effect
  2. Completeness
  3. Both a. and b.
  4. None of the above
discuss
Encryption algorithms are divided into two categories based on the ______

Encryption algorithms are divided into two categories based on the ______.


  1. Output type
  2. Input type
  3. Process type
  4. All of the mentioned above
discuss
Cipher block chaining or CBC is an advancement made on _____

Cipher block chaining or CBC is an advancement made on _____.


  1. Electronic Code Book
  2. Decrypted code
  3. System engineering
  4. All of the mentioned above
discuss
A secure block cipher is suitable for the encryption,

A secure block cipher is suitable for the encryption,


  1. True
  2. False
discuss
Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications

Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.


  1. Next block
  2. Previous block
  3. Middle block
  4. All of the mentioned above
discuss
In cryptography, a product cipher combines two or more transformations,

In cryptography, a product cipher combines two or more transformations,


  1. True
  2. False
discuss
total MCQs: 11

MCQs

11

Views

35

Best Answers

299

Points

5