PARISUTHAM INSTITUE OF TECHNOLOGY & SCIENCE CS1355-CRYPTOGRAPHY AND NETWORK SECURITY –VI SEM (DEPARTMENT OF IT) QUIZ QUESTIONS AND ANSWERS 1) This is an encryption/decryption key known only to the party or parties that exchange secret messages. a) e-signature b) digital certificate c) private key d) security token Ans: c) private key 2) This was commonly used in cryptography during World War II. a) tunneling b) Personalization c) van Eck phreaking d) one-time pad Ans: d) one-time pad 3) Today, many Internet businesses and users take advantage of cryptography based on this approach. a) public key infrastructure b) output feedback c) Encrypting File System d) single sign on Ans: a) public key infrastructure 4) This is the name for the issuer of a PKI certificate. a) man in the middle b) certificate authority c) Resource Access Control Facility d) script kiddy Ans :b) certificate authority 5) Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations. a) DSS b) OCSP c) Secure HTTP d) Pretty Good Privacy Ans: d) Pretty Good Privacy 6) This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm. a) Rijndael b) Kerberos c) Blowfish d) IPsec Ans: a) Rijndael 7) This is the inclusion of a secret message in otherwise unencrypted text or images. a) masquerade b) steganography c) spoof d) eye-in-hand system Ans: b) steganography 8) In AES the final round of both encryption and decryption consist of only _____ stages. Ans: 3 stages. 9) This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa. a) foot printing b) hash function c) watermark d) Electronic Code Book Ans: d) Electronic Code Book 10) This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies. a) chaffing and winnowing b) cryptanalysis c) serendipity d) brute force cracking Ans:d) brute force cracking 11) The two basic functions used in encryption algorithms are __________and __________ Ans: Substitution, Transposition 12) How many keys are required for two people to communicate via a cipher a) One Key in Symmetric cipher b) Two Keys in Asymmetric cipher c) Always Two keys in Symmetric d) More than two keys in Asymmetric Ans: a&b 13) The two approaches to attack a cipher are_______________ and _______________ Ans : Cryptanalysis , Brute-force attack 14) S-boxes in DES a) Two b) Four c) Thirty Two d) Eight Ans: d) Eight 15) In each S-Box in DES , it takes a) Two bits input and produce 4 bits as output b) Six bits input and produce 4 bits as output c) Eight bits input and produce 6 bits as output d) Six bits input and produce 6 bits as output Ans: b) Six bits input and produce 4 bits output 16) A change in one of the bit of the plaintext should produce a change in many bits of the cipher text it is called as _____________________ Ans: Avalanche Effect. 17) A ________________processes the input one block of elements at a time, producing an output block for each input block. Ans: Block Cipher 18) In Rotor Machines, each cylinder has ___ input pins and ___ output pins. Ans: 26 input pins and 26 output pins 19) The areas of cryptography and cryptanalysis are called ____________ Ans: Cryptology. 20) In each round of DES________ key bits are used. Ans: 48 bits 21) A Covert Channel is a) Secure Channel b) Secure Channel for short messages c) Insecure Channel for Long messages d) Insecure Channel Ans: d) Insecure channel 22) How many bits are used in AES a) 64 bits b) 56 bits c) 128 bits d) 192 bits 23) What type of attack “denial of service” is ? Ans: Active attack 24)_____________ matrix is used in Playfair cipher . Ans: 5*5 matrix 25) What is the typical size for number of rounds in Feistel Cipher? Ans: 16 rounds. Ans: d) 192 bits