Applied Cryptography: (QUIZ - Module 1 & 2) Name: Akshat Gupta Enroll. No. A2305218172 Class/Section. 7CSE-3X
Applied Cryptography: (QUIZ - Module 1 & 2) Name: Akshat Gupta Enroll. No. A2305218172 Class/Section. 7CSE-3X
3. pi in terms of base 26 is
Ans:D.DRS
4. The time required to convert a k-bit integer to its representation in the base 10 in terms of big-O
notation is
Ans: O(log2 n)
7. Monoalphabetic ciphers are stronger than Polyalphabetic ciphers because frequency analysis is
tougher on the former.
Ans:False
8. Which are the most frequently found letters in the English language ?
Ans: e,t
10. If all letters have the same chance of being chosen, the IC is approximately
Ans:0.038
14. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________
Ans: Scaling of the existing bits
15. In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring every 4th bit.
Ans: False
16. A straight permutation cipher or a straight P-box has the same no of inputs as
Ans: outputs
17. The man in the middle attack can endanger the security of the Diffie-Hellman method if two
parties are not
Ans: authenticated
23. in Asymmetric -key cryptography, although rivest, shamir, and Adelman (RSA) can be used to
encrypt and decrypt actual messages, it is very slow if the message is
Ans:Long
26. in symmetric – key cryptography, the key locks and unlocks the box is
Ans:Same
31. the cipher feedback (CFB) MODE WAS created for those situations in which we need to send or
receive R bits of
Ans:data
33. which of the following requires no password travel across the internet?
Ans: challenge-response system
34. Asymmetric Encryption: why can a message encrypted with the public key only be decrypted with
the receiver’s appropriate private key?
Ans:A so called “one way function with back door” is applied for the encryption
35. An electronic documents that establishes your credentials when you are performing transactions.
Ans: Digital certificate
37. Under DES, the data encryption standard took a 64-bit block of data and subjected it to -----level
of encryption.
Ans:16
38. …………….is widely used today for protecting data in transit in a variety of application such as
data transfer on the internet, and on cellular phone networks.
Ans:Encyption