0% found this document useful (0 votes)
380 views

Applied Cryptography: (QUIZ - Module 1 & 2) Name: Akshat Gupta Enroll. No. A2305218172 Class/Section. 7CSE-3X

This document contains a quiz on applied cryptography consisting of 38 multiple choice questions. The questions cover topics related to cryptographic algorithms, ciphers, encryption techniques, keys, plaintexts, ciphertexts, and other cryptographic concepts. The document lists the name and enrollment number of the student taking the quiz, and includes their responses to each question in the form of a multiple choice answer.

Uploaded by

Akshat Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
380 views

Applied Cryptography: (QUIZ - Module 1 & 2) Name: Akshat Gupta Enroll. No. A2305218172 Class/Section. 7CSE-3X

This document contains a quiz on applied cryptography consisting of 38 multiple choice questions. The questions cover topics related to cryptographic algorithms, ciphers, encryption techniques, keys, plaintexts, ciphertexts, and other cryptographic concepts. The document lists the name and enrollment number of the student taking the quiz, and includes their responses to each question in the form of a multiple choice answer.

Uploaded by

Akshat Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

APPLIED CRYPTOGRAPHY

(QUIZ -Module 1 & 2)

Name: Akshat Gupta


Enroll. No. A2305218172
Class/Section. 7CSE-3X

1. Divide (HAPPY)26 by (SAD)26. We get quotient –


Ans: KD

2. Dividing (11001001) by (100111) gives remainder –


Ans:110

3. pi in terms of base 26 is
Ans:D.DRS

4. The time required to convert a k-bit integer to its representation in the base 10 in terms of big-O
notation is
Ans: O(log2 n)

5. In base 26, multiplication of YES by NO gives –


Ans: MPJNS

6. Division of (131B6C3) base 16 by (lA2F) base 16 yeilds –


Ans: 9AD

7. Monoalphabetic ciphers are stronger than Polyalphabetic ciphers because frequency analysis is
tougher on the former.
Ans:False

8. Which are the most frequently found letters in the English language ?
Ans: e,t

9. On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword


“HUMOR” we get cipher text-
Ans: abqdvmwuwjphfvvyyrfznydokvl

10. If all letters have the same chance of being chosen, the IC is approximately
Ans:0.038

11. Consider the cipher text message with relative frequencies:


4 0 10 25 5 32 24 15 6 11 5 5 1 2 6 6 15 19 10 0 6 28 8 2 3 2
The Index of Coincidence is
Ans: 0.067

12.Consider the cipher text message:


YJIHX RVHKK KSKHK IQQEV IFLRK QUZVA EVFYZ RVFBX UKGBP KYVVB QTAJK
TGBQO ISGHU CWIKX QUXIH DUGIU LMWKG CHXJV WEKIH HEHGR EXXSF DMIIL
UPSLW UPSLW AJKTR WTOWP IVXBW NPTGW EKBYU SBQWS
Relative Frequencies –
3 7 2 2 5 5 7 9 11 4 14 4 2 1 3 4 6 5 6 5 7 10 9 8 4 2
The Index of Coincidence is –
Ans:0.044

13. In affine block cipher systems if f(m)=Am + t, what is f(m1+m2+m3) ?


Ans: f(m1) + f(m2) + f(m3)

14. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ____________
Ans: Scaling of the existing bits

15. In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring every 4th bit.
Ans: False

16. A straight permutation cipher or a straight P-box has the same no of inputs as
Ans: outputs

17. The man in the middle attack can endanger the security of the Diffie-Hellman method if two
parties are not
Ans: authenticated

18. The heart of Data Encryption Standard (DES), is the


Ans: DES Function

19. the cryptography algorithm (ciphers) are divided into


Ans:Two group

20. in cryptography the original message, before being transformed is called


Ans:Plain text

21. An encryption algorithm tranforms the plain text into


Ans: cipher text

22. the international data encryption algorithm (IDEA) was developed by


Ans: xuejia Lai and james massey

23. in Asymmetric -key cryptography, although rivest, shamir, and Adelman (RSA) can be used to
encrypt and decrypt actual messages, it is very slow if the message is
Ans:Long

24. in rotation cipher, keyless rotation the no of rotation is


Ans: fixed

25. In symmetric – key cryptography both party used


Ans: same keys

26. in symmetric – key cryptography, the key locks and unlocks the box is
Ans:Same

27. the keys used in cryptography are


Ans:All of them
28. DES Is an example of
Ans: complex block cipher

29. the relationship b/t a character IN THE PLAINTEXT TO A character is


Ans: one to many relationship

30. Cryptography, a word with Greek origins, means


Ans:secret writing

31. the cipher feedback (CFB) MODE WAS created for those situations in which we need to send or
receive R bits of
Ans:data

32. A transposition cipher reorders (permutes) symbols in a


Ans: block of symbols

33. which of the following requires no password travel across the internet?
Ans: challenge-response system

34. Asymmetric Encryption: why can a message encrypted with the public key only be decrypted with
the receiver’s appropriate private key?
Ans:A so called “one way function with back door” is applied for the encryption

35. An electronic documents that establishes your credentials when you are performing transactions.
Ans: Digital certificate

36. Triple-DES has___keys


Ans:2

37. Under DES, the data encryption standard took a 64-bit block of data and subjected it to -----level
of encryption.
Ans:16

38. …………….is widely used today for protecting data in transit in a variety of application such as
data transfer on the internet, and on cellular phone networks.
Ans:Encyption

You might also like