Here, we have a set of multiple-choice questions and answers (quiz) on Cryptography Techniques of Block Cipher.

### questions

Title
###### What is the block size of plain text in SHA- 512 algorithm?

What is the block size of plain text in SHA- 512 algorithm?

1. 512 bits
2. 1024 bits
3. 2048 bits
4. None of the above
###### All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?

All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?

1. Substitution bytes
2. Shift rows
3. Mix columns

1. i.
2. iii.
3. All of the mentioned
4. None of the mentioned
###### What does IDEA stand for in the world of cryptography? or The IDEA word in the IDEA algorithm is the abbreviation for which of the following?

What does IDEA stand for in the world of cryptography?

or

The IDEA word in the IDEA algorithm is the abbreviation for which of the following?

1. Independent Decryption Environment Analysis
2. International Defense Encryption Area
3. International Data Encryption Algorithm
4. None of the above
###### How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?

How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?

1. 64 sub- keys
2. 48 sub- keys
3. 52 sub- keys
4. Only one key and no subkeys
###### "The number of rounds in the AES algorithm depends upon the key size being used." Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?

"The number of rounds in the AES algorithm depends upon the key size being used."

Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?

1. 128 key size: 10 rounds
2. 192 key size: 12 rounds
3. 256 key size: 14 rounds
4. All of the above
###### Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?

Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?

1. Avalanche effect
2. Completeness
3. Both a. and b.
4. None of the above
###### Encryption algorithms are divided into two categories based on the ______

Encryption algorithms are divided into two categories based on the ______.

1. Output type
2. Input type
3. Process type
4. All of the mentioned above
###### Cipher block chaining or CBC is an advancement made on _____

1. Electronic Code Book
2. Decrypted code
3. System engineering
4. All of the mentioned above
###### A secure block cipher is suitable for the encryption,

A secure block cipher is suitable for the encryption,

1. True
2. False
###### Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications

Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.

1. Next block
2. Previous block
3. Middle block
4. All of the mentioned above
###### In cryptography, a product cipher combines two or more transformations,

In cryptography, a product cipher combines two or more transformations,

1. True
2. False

MCQs

Views