0% found this document useful (0 votes)
41 views

QB - Offline MCQ Exam - Unit - 2 - Ics

This document contains a question bank of multiple choice questions related to the subject of Information and Cyber Security. The questions cover topics related to data encryption algorithms like DES, AES, their structure, key sizes, number of rounds, modes of operation like ECB, CBC, CTR etc. There are a total of 32 questions in the bank.

Uploaded by

Nisha Mate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views

QB - Offline MCQ Exam - Unit - 2 - Ics

This document contains a question bank of multiple choice questions related to the subject of Information and Cyber Security. The questions cover topics related to data encryption algorithms like DES, AES, their structure, key sizes, number of rounds, modes of operation like ECB, CBC, CTR etc. There are a total of 32 questions in the bank.

Uploaded by

Nisha Mate
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

PRIYADARSHINI BHAGWATI COLLEGE OF ENGINEERING,Nagpur

Question Bank for Online MCQ Based Exam


SUBJECT :- INFORMATION AND CYBER SECUITY
Unit -2

1. DES follows
a) Hash Algorithm
b) Caesars Cipher
c) Feistel Cipher Structure
d) SP Networks
2. The DES Algorithm Cipher System consists of ____________rounds (iterations)
each with a round key
a) 12
b) 18
c) 9
d) 16
3. The DES algorithm has a key length of
a) 128 Bits
b) 32 Bits
c) 64 Bits
d) 16 Bits
4. In the DES algorithm, although the key size is 64 bits only 48bits are used for
the encryption procedure, the rest are parity bits.
a) True
b) False
5. In the DES algorithm the round key is __________ bit and the Round Input is
____________bits.
a) 48, 32
b) 64,32
c) 56, 24
d) 32, 32
6. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits
via ____________
a) Scaling of the existing bits
b) Duplication of the existing bits
c) Addition of zeros
d) Addition of ones
7. The Initial Permutation table/matrix is of size
a) 16×8
b) 12×8
c) 8×8
d) 4×8
8. The number of unique substitution boxes(S-BOX) in DES after the 48 bit XOR
operation are
a) 8
b) 4
c) 6
d) 12
9. In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring
every 4th bit.
a) True
b) False (Explanation: Every 8th bit is ignored to shorten the key length.)
10. A Preferable cryptographic algorithm should have a good avalanche effect.
a) True
b) False

11.the no of test required to break DES algorithm

a) 2.8 * 1014

b)4.2*109

c)1.84*109

d)7.2*1016 ( that is mean 256)

12.How Many keys does triple DES algorithm use ?

a) 2
b) 3
c) 2 or 3
d) 3 or 4

13.In Triple DES the key size is …… and meet in the middle attack take …… test to break the key

a)2192,2112

b)2184,2111

c)2168,2111

d)2168,2112

14. AES uses a ____________ bit block size and a key size of __________ bits.
a) 128; 128 or 256
b) 64; 128 or 192
c) 256; 128, 192, or 256
d) 128; 128, 192, or 256 (Explanation: It uses a 128-bit block size and a key size
of 128, 192, or 256 bits.)

15. Like DES, AES also uses Feistel Structure.

a) True
b) False

16. Which one of the following is not a cryptographic algorithm- JUPITER,


Blowfish, RC6, Rijndael and Serpent?

a) JUPITER
b) Blowfish
c) Serpent
d) Rijndael

17.How many rounds does the AES-192 perform?


a) 10
b) 12
c) 14
d) 16

18. How many rounds does the AES-256 perform?


a) 10
b) 12
c) 14
d) 16

19. What is the expanded key size of AES-192?


a) 44 words
b) 60 words
c) 52 words
d) 36 words

20. The 4×4 byte matrices in the AES algorithm are called
a) States
b) Words
c) Transitions
d) Permutations

21. In AES the 4×4 bytes matrix key is transformed into a keys of size __________
a) 32 words
b) 64 words
c) 54 words
d) 44 words
22. For the AES-128 algorithm there are __________ similar rounds and _________
round is different.
a) 2 pair of 5 similar rounds ; every alternate
b) 9 ; the last
c) 8 ; the first and last
d) 10 ; no

23. Which of the 4 operations are false for each round in the AES algorithm
i) Substitute Bytes
ii) Shift Columns
iii) Mix Rows
iv) XOR Round Key

a) i) only
b) ii) iii) and iv)
c) ii) and iii)
d) only iv)

24. There is an addition of round key before the start of the AES round algorithms.
a) True
b) False

25. How many modes of operation are there in in DES and AES?
a) 4
b) 3
c) 2
d) 5

26. Which one of the following modes of operation in DES is used for operating
short data?
a) Cipher Feedback Mode (CFB)
b) Cipher Block chaining (CBC)
c) Electronic code book (ECB)
d) Output Feedback Modes (OFB)

27. Which of the following is false for ECB mode of operation


i) The Plain text is broken into blocks of size 128 bytes
ii) Blocks can be swapped, repeated, replaced without recipient noticing
iii) Good for short data
iv) Encryption of each block is done separately using a randomly generated key for
each block
a) i) only
b) ii) and iii)
c) i) and iv)
d) i) ii) and iv)

28. Which of the following statements are true


i) In the CBC mode, the plaintext block is XORed with previous ciphertext block
before encryption
ii) The CTR mode does not require an Initialization Vector
iii) The last block in the CBC mode uses an Initialization Vector
iv) In CBC mode repetitions in plaintext do not show up in ciphertext

a) iii)
b) ii) and iv)
c) All the Statements are true
d) i) ii) and iv)

29. Which of the following modes does not implement chaining or “dependency on
previous stage computations”?
a) CTR, ECB
b) CTR, CFB
c) CFB, OFB
d) ECB, OFB

30. The counter value in CTR modes repeats are a regular interval.
a) True
b) False

31. How many round keys are generated in the AES algorithm?
a) 11
b) 10
c) 8
d) 12

32.

You might also like