Deck 2: Cryptography and Encryption
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
Play
Full screen (f)
Deck 2: Cryptography and Encryption
1
Choose from among the following cipher systems, from best to the worst, with respect to ease of decryption using frequency analysis.
A)random polyalphabetic , plaintext , playfair
B)random polyalphabetic , playfair , vignere
C)random polyalphabetic , vignere , playfair , plaintext
D)random polyalphabetic , plaintext , beaufort , playfair
A)random polyalphabetic , plaintext , playfair
B)random polyalphabetic , playfair , vignere
C)random polyalphabetic , vignere , playfair , plaintext
D)random polyalphabetic , plaintext , beaufort , playfair
random polyalphabetic , vignere , playfair , plaintext
2
On Encrypting "thepepsiisintherefrigerator" using Vignere Cipher System using the keyword "HUMOR" we get cipher text-
A)abqdnwewuwjphfvrrtrfzn sdokvl
B)abqdvmwuwjphfvvyyrf znydokvl
C)tbqyrvmwuwjphfvvyy rfznydokvl
D)baiuvmwuwjphfoeiyrf znydokvl
A)abqdnwewuwjphfvrrtrfzn sdokvl
B)abqdvmwuwjphfvvyyrf znydokvl
C)tbqyrvmwuwjphfvvyy rfznydokvl
D)baiuvmwuwjphfoeiyrf znydokvl
abqdvmwuwjphfvvyyrf znydokvl
3
. Rail Fence Technique is an example of
A)substitution
B)transposition
C)product cipher
D)ceaser cipher
A)substitution
B)transposition
C)product cipher
D)ceaser cipher
transposition
4
Public key encryption is advantageous over Symmetric key Cryptography because of
A)speed
B)space
C)key exchange
D)key length
A)speed
B)space
C)key exchange
D)key length
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
The sub key length at each round of DES is
A)32
B)56
C)48
D)64
A)32
B)56
C)48
D)64
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Which one is the strong attack mechanism?
A)chosen plaintext attack
B)chosen cipher text
C)brute force attack
D)man in the middle attack
A)chosen plaintext attack
B)chosen cipher text
C)brute force attack
D)man in the middle attack
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Interception is an attack on
A)availability
B)confidentiality
C)integrity
D)authenticity
A)availability
B)confidentiality
C)integrity
D)authenticity
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Chosen cipher text attack is based on
A)cryptanalysis
B)cryptography
C)encryption
D)decryption
A)cryptanalysis
B)cryptography
C)encryption
D)decryption
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
The process of writing the text as rows and read it as columns is known as
A)vernam cipher
B)ceaser cipher
C)transposition columnar cipher
D)homophonic substitution cipher
A)vernam cipher
B)ceaser cipher
C)transposition columnar cipher
D)homophonic substitution cipher
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Biometric authentication works on the basis of
A)human characteristics
B)passwords
C)smart cards
D)pin
A)human characteristics
B)passwords
C)smart cards
D)pin
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
Which layer filters the proxy firewall?
A)application
B)network
C)transport
D)none of the above
A)application
B)network
C)transport
D)none of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
Encryption Strength is based on
A)strength of algorithm
B)secrecy of key
C)length of key
D)all of the above
A)strength of algorithm
B)secrecy of key
C)length of key
D)all of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
GCD(a,b) = GCD(b,a mod b)
A)true
B)false
C)cannot be determined
D)none
A)true
B)false
C)cannot be determined
D)none
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
All groups satisfy properties
A)g-i to g-v
B)g-i to g-iv
C)g-i to r-v
D)r-i to r-v
A)g-i to g-v
B)g-i to g-iv
C)g-i to r-v
D)r-i to r-v
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
An Abelian Group satisfies the properties
A)g-i to g-v
B)g-i to g-iv
C)g-i to r-v
D)r-i to r-v
A)g-i to g-v
B)g-i to g-iv
C)g-i to r-v
D)r-i to r-v
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
A Ring satisfies the properties
A)r-i to r-v
B)g-i to g-iv
C)g-i to r-v
D)g-i to r-iii
A)r-i to r-v
B)g-i to g-iv
C)g-i to r-v
D)g-i to r-iii
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
A Ring is said to be commutative if it also satisfies the property
A)r-vi
B)r-v
C)r-vii
D)r-iv
A)r-vi
B)r-v
C)r-vii
D)r-iv
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
An 'Integral Domain' satisfies the properties
A)g-i to g-iii
B)g-i to r-v
C)g-i to r-vi
D)g-i to r-iii
A)g-i to g-iii
B)g-i to r-v
C)g-i to r-vi
D)g-i to r-iii
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
Does the set of residue classes (mod 3) form a group with respect to modular addition?
A)yes
B)no
C)can\t say
D)insufficient data
A)yes
B)no
C)can\t say
D)insufficient data
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
For the group Sn of all permutations of n distinct symbols, what is the number of elements in Sn?
A)n
B)n-1
C)2n
D)n!
A)n
B)n-1
C)2n
D)n!
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
a(b+c) = ac+bc is the representation for which property?
A)g-ii
B)g-iii
C)r-ii
D)r-iii
A)g-ii
B)g-iii
C)r-ii
D)r-iii
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
a.(b.c) = (a.b).c is the representation for which property?
A)g-ii
B)g-iii
C)r-ii
D)r-iii
A)g-ii
B)g-iii
C)r-ii
D)r-iii
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
AES uses a ________bit block size and a key size of__________bits.
A)128; 128 or 256
B)64; 128 or 192
C)256; 128, 192, or 256
D)128; 128, 192, or 256
A)128; 128 or 256
B)64; 128 or 192
C)256; 128, 192, or 256
D)128; 128, 192, or 256
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
Like DES, AES also uses Feistel Structure.
A)true
B)false
C)cannot be determined
D)none
A)true
B)false
C)cannot be determined
D)none
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Which one of the following is not a cryptographic algorithm?
A)jupiter
B)blowfish
C)serpent
D)none
A)jupiter
B)blowfish
C)serpent
D)none
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck