0% found this document useful (0 votes)
297 views33 pages

Cryptography and Network Security 1

Cryptography and Network Security (CNS) deals with aspects of information security such as security attacks, security mechanisms, security services, and authentication protocols. Some key topics covered include confidentiality, data integrity, authentication, non-repudiation, encryption algorithms like AES and DES, and attacks like replay attacks.

Uploaded by

Priti Patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
297 views33 pages

Cryptography and Network Security 1

Cryptography and Network Security (CNS) deals with aspects of information security such as security attacks, security mechanisms, security services, and authentication protocols. Some key topics covered include confidentiality, data integrity, authentication, non-repudiation, encryption algorithms like AES and DES, and attacks like replay attacks.

Uploaded by

Priti Patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 33

Cryptography and Network Security (CNS)

1. ____________are aspects of information security

1. security attack

2. security mechanism

3. security service

4. All of these 

2. What  is  X.800?

a.  Security parameters

b. Security services

c. Security attacks

d. Authentication protocol

3. Protection against denial by one of the parties in a communication is called as 

a. Authentication

b. Access control

c. Non-Repudiation 

d. Data intergrity

3. _____ is protection of data from unauthorized disclosure

a. Data Authentication 

b. Data Integrity

c. Authentication

d. Data Confidentiality 
3. Passive capture of a data unit and its subsequent re-transmission to produce an unauthorized effect is known as______________________
attack.

a. Masquerade

b. Replay

c. Release of message contents

d. Denial of Service

6. Assurance that data received is as sent by an authorized entity is________

a. Data Authentication 
b. Data Integrity
c. Authentication
d. Access control

7. Denial of Service is _________ Attack

a.  Active
b. Passive
c.  Not an
d. Active and Passive

8. Traffic monitoring  is ___________ attack

a.  Active
b. Passive
c.  Not an Active nor Passive
d. Active as well as Passive

9. Which of following attack is passive?

1. Replay
2. Release of message content
3. Denial of service
4. Man- in-Middle attack

10. What is Ciphertext of the plaintext “MIDSEMEXAM” if it is encrypted using Playfair cipher? Where the key is “QUARANTINE”.
a. WFKLIOAGLO
b. FWLKIOAGOL
c. WFLKLIOLOAG 
d. FWKLAGLOIO 

11. What will be the ciphertext of the  plaintext is “GOODEVENING”, if it is encrypted using transposition cipher? Where key is “4 2 1 3”

11. Key size of Monoalphabetic cipher is depends upon 

a. Length of message
b. Total number of symbols used to code the message 
c. Total number of symbols can be  used to code any message
d. 26

13.  Which of the following is correct hierarchy with more axioms/laws?

a. Group, Field, Rings


b. Group, Ring, Field
c. Field, Ring, Group
d. Ring,Group,Field

14. GCD of 1066 and 94 is _____

14. GF(2 ) is known as ___


n

a. Galois fields
b. Prime field
c. Graded function
d. Generator Field

16.  The AES cipher has_______ blocksize  and _________ keys 

a. 128/192/256 bit ,128 bit


b. 128 bit, 128/192/256 bit
c. 64, 56
d. 128/192/256 byte ,128 bit 

17. State in AES is of size___


a. 16 bytes
b. 4 bytes 
c. 16 bits
d. 8 bytes

18. S-Box of AES is of __________

a. 256 bytes 
b. 16 X16 bits
c. 256 bits
d. 16 bytes

19. Which of following statement is true with respect of AES

a. Subkeys are function of main key and S-box


b. Subkeys are derived from   main key 
c. Subkeys are independent of S-box
d. Subkeys arenot  function of main key and S-box 

20. Round keys in DES are derived from

a. Main key
b. Main key and plaintext
c. Main key and S-box
d. S-box

21. Number rounds/bloksize/key in DES are

a. 10/64/56
b. 16/64/56
c. 10/128/64
d. 16/64/128

22. How many S-box are in DES?

a. 8 of 256 bit  each


b. 8 of 64 bit each
c. 8 of 128 bit each
d. 8 of 32 bit each 
23. Consider the set G={0,1,2,3,4,5,6,7} along with addition modulo 8 operation. What is  inverse of 3 in this system

a. 1

b. 0

c. 2

d. 5

23. __________________ is an assurance that the communicating entity is the one claim

1. Repudiation

2. Data integrity

3. Confidentiality

4. Authentication

25. __________ is protection against denial of transmission by one of the parties in a communication.

a. Data integrity

b. Authentication

c. Non-repudiation

d. Confidentiality

26. Passive capture of a data unit and its subsequent re-transmission to produce an unauthorized effect is known as______________________
attack.

a. Masquerade

b. Replay

c. Release of message contents

d. Denial of Service

27. Which of the following is/are active attacks

a. Replay
b. Masquerade

c. Modification of message

d. All of the above

28. Which of the following is not an example of passive attack

a. Release of message contents

b. Replay

c. Masquerade

d. Both b & c

29. What is the cipher text of the message “meet me after the toga party” using transposition cipher with key 4312567

a. COIXTTNAAPTMTSUOAODWKNLYPETZ

b. AODW TTNAAPTMTSUOCOIXKNLYPETZ

c. APTMTTNATSUOAODWCOIXKNLYPETZ

d. TTNAAPTMTSUOAODWCOIXKNLYPETZ

30. If both sender and receiver use the same key, the system is referred to as__________

a.  Symmetric key encryption

b. Asymmetric key encryption

c. Public key encryption

d. Block cipher

31. If different keys are used for encryption and decryption then the system is referred to as________ cipher.

a. Conventional

b. Block

c. Stream
d. Asymmetric 

32. Which of the following is/are substitution cipher

a. Playfair cipher

b. Monoalphabetic cipher

c. Polyalhpabetic cipher

d. All of the above

33. In a playfair cipher designed using keyword MONARCHY (assume letter I and J are placed together). What is encryption of “yt”

a. QD

b. DQ

c. BS

d. HL

34. Block size in DES is _______

a. 56-bit

b. 64-bit

c. 128-bit

d. 256-bit

35. Total number of sub-keys used in DES are_____

a. 12

b. 14

c. 16

d. 18

36. Size of sub-key in DES is______


a. 16-bit

b. 32-bit

c. 48-bit

d. 64-bit

37. Size of key in DES is____

a. 56-bit

b. 128-bit 

c. 256-bit

d. 512-bit

38.  Total number of S-Boxes used in DES are_____

a. 4

b. 6

c. 8

d. 10

39.  GCD of (36939, 15246) is_______

a. 21

b. 7

c. 3

d. 1

40.  Multiplicative inverse  of 5678 mod 8765 is______

a. 2426

b. 2725
c. 2527

d. Inverse does not exist

41.  Multiplicative inverse of 5994 mod 20736 _______

a. 235

b. 1841

c. 354

d. Inverse does not exist

42. Multiplicative inverse of 826 mod 2789______

a. 843

b. 834

c. 384

d. Inverse does not exist

43.  Consider the set G={0,1,2,3,4,5,6,7} along with addition modulo 8 operation. What is  inverse of 3 in this system

a. 1

b. 0

c. 2

d. 5

44.  Consider the set G={0,1,2,3,4,5,6,7} along with multiplication modulo 8 operation. What is  inverse of 7 in this system

a. 7

b. 1

c. 0

d. 6
45.  Number of rounds in AES cipher can be_________

a. 8,10 and 12

b. 10,14 and 18

c. 10,12 and 14

d. 8,12 and16

46.  Block size in AES is _________

a. 64-bit

b. 128-bit

c. 192-bit

d. 256-bit

47.  Round key size in AES is_____

a. 32-bit

b. 64-bit

c. 128-bit

d. 256-bit

48.  Which of the following is not a valid key size in AES

a. 128-bit

b. 192-bit

c. 256-bit

d. 512-bit

49. AES with 128-bit key size has_____rounds.

a. 6
b. 4

c. 8

d. 10 

50.  What is -21 mod 9

a. 3

b. 4

c. 5

d. 6

51.  What is -11 mod 7

a. 4

b. 3

c. 2

d. 1

52.  Triple DES can be used with _____ keys.

a. 2

b. 3

c. 2 or 3 

d. 1 

53.  Which of the following is vulnerable to meet-in-the-middle attack

a. DES

b. AES

c. Triple DES
d. Double DES

54. __________________ is an assurance that the communicating entity is the one claim

a. Repudiation

b. Data integrity

c. Confidentiality

d. Authentication

55. Which of the following is/are active attacks

a. Replay

b. Masquerade

c. Modification of message

d. All of the above

56. What is the cipher text of the message “meet me after the toga party” using transposition cipher with key 4312567

a. COIXTTNAAPTMTSUOAODWKNLYPETZ

b. AODW TTNAAPTMTSUOCOIXKNLYPETZ

c. APTMTTNATSUOAODWCOIXKNLYPETZ

d. TTNAAPTMTSUOAODWCOIXKNLYPETZ

57. Which of the following is/are substitution cipher

a. Playfair cipher

b. Monoalphabetic cipher

c. Polyalhpabetic cipher

d. All of the above

58. Size of sub-key in DES is______


a. 16-bit

b. 32-bit

c. 48-bit

d. 64-bit

59. Total number of S-Boxes used in DES are_____

a. 4

b. 6

c. 8

d. 10

60. Multiplicative inverse  of 5678 mod 8765 is______

a. 2426

b. 2725

c. 2527

d. Inverse does not exist

61. Consider the set G={0,1,2,3,4,5,6,7} along with addition modulo 8 operation. What is  inverse of 3 in this system

a. 1

b. 0

c. 2

d. 5

62. Number of rounds in AES cipher can be_________

a. 8,10 and 12

b. 10,14 and 18
c. 10,12 and 14

d. 8,12 and16

63.  Which of the following is not a valid key size in AES

a. 128-bit

b. 192-bit

c. 256-bit

d. 512-bit

64.   Which mode is used for secure transmission of single values?

1.         Cipher Block Chaining 

2. Output Feedback mode

3.         Counter mode

4. Electronic Codebook Mode

65. RC4 is_______

a. Block Cipher

b. Stream cipher

c. Transposition cipher

d. All of above

66. Requirements for a sequence of random numbers are  

1. Randomness

2. Unpredictability

3. Randomness & Unpredictability

4. Uniform distribution
67. Log (10) =
2,19

a. 17

b. 18

c. 13

d. 2

68. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the
plaintext M?

a. 4

b. 3

c. 5

d. None of these

69. Which of the following algorithms are used for Authentication,  Key exchange as well as Encryption/decryption 

1. RSA

2. ECC

3. RSA and ECC

4. DH key exchange 

70. Which of the following algorithms are used for Authentication,  Key exchange as well as Encryption/decryption 

a.      RSA

b. ECC

c.       RSA and ECC

d. DH key exchange 

71. Users A and B use the Diffie-Hellman key exchange technique with a common prime q = 71 and a primitive root a = 4.  If user A
has private key XA = 5, If user B has private key XB = 3. What is the shared secret key?
a. 20

b. 30

c. 64

d. 3

72. Which asymmetric algorithm provides better security if key size is restricted to 512 bit 

a. Elliptic Curve Cryptography

b. Diffie-Hellman key exchange

c. RSA

d. ElGamal

73. Which of  following statement is true 

a. ElGamal algorithm can be used to create digital signature

b. Diffie-Hellman key exchange can be used for data authentication

c. Both a and b 

d. None of these

74. Which mode is used for secure transmission of single values?

a. Cipher Block Chaining 

b. Output Feedback mode

c. Counter mode

d. Electronic Codebook Mode

75. Encrypting/decrypting blocks of size  less than 64 bit  using DES is possible using _______ mode 

1. Cipher Block Chaining 


2. Cipher Feedback mode

3. Counter mode

4. Electronic Codebook Mode

76. Encryption (or decryption) in _____ mode can be done in parallel on multiple blocks of plaintext or ciphertext

1. Cipher Block Chaining 

2. Cipher Feedback 

3. Counter mode

4. Output Feedback 

77.  In RC4 ,A variable-length key of  size _________ is used

a.  1 to 256 bits

b. 8 to 1024bits

c. 1 to 256 bytes

d. 64 to 128 bits

78. RC4 is_______

a. Block Cipher

b. Stream cipher

c. Transposition cipher

d. All of above

79. ________ is  primitive operations are used in RC4

a. random permutation

b. swap

c. XOR
d. All of above

80. Requirements for a sequence of random numbers are  

a. Randomness

b. Unpredictability

c. Randomness & Unpredictability

d. Uniform distribution

81. ANSI X9.17 PRNG uses_________

a. DES

b. AES

c. Triple DES 

d. RC4

82. Blum BlumShub (BBS) generator produces sequence of random ____

a. Bits

b. Bytes

c. Both

d. None of these

83. Euler’s totient function, written Φ(n), and defined as

a. The number of positive integers less than n and relatively prime to n

b. The number of positive integers less than or equal to n and relatively prime to n

c. The number of positive greater than n and relatively prime to n

d. None of these

84. Log (10) =


2,19
e. 17

e. 18

e. 13

e. 2

85.  If  n=p*q, p=11, q=13 then Φ(n) is 

a. 130

b. 143

c. 120

d. 100

86. Which of the following statements is true:

a.   An integer n is divisible by 6 if and only if it is divisible by 3.

b.  For all integers a, b, and c, a | bc if and only if a | b and a | c.

c.  For all integers a, b, and c, a | (b + c) if and only if a | b and a | c.

d. If a and b are integers, then a | b if and only if a | b .


2 2

87. gcd (a, a+1) is ______

a. 1

b. a

c. a+1

d. 2a

88.  3  mod 229 is ____


228

a. 1

b. 13
c. 5

d. 3 

89. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the
plaintext M?

a. 4

b. 3

c. 5

d. None of these

90. In a public-key system using RSA, you intercept the Plaintext P = 15 sent to a user whose public key is e = 7, n = 65 . What are values
of private keys?

1.    {7, 5,13}

2. {5,13}

3.     {7, 13}

4. None of these

91. RSA can be used for  

1.  Authentication 

2. Key exchange

3. Encryption/decryption 

4. All of these 

92. Which of the following algorithms are used for Authentication,  Key exchange as well as Encryption/decryption 

a. RSA

b. ECC

c. RSA and ECC


d. DH key exchange 

93. If RSA is used for  message Authentication 

1. Message is encrypted using senders private key and decrypted using senders public key

2. Message is encrypted using senders private key and decrypted using receivers public key

3. Message is encrypted using receivers public key and decrypted using receivers private key

4. Message is encrypted using receivers private key and decrypted using receivers public key

94. If RSA is used for  transmission of secret message

1. Message is encrypted using senders private key and decrypted using senders public key

2. Message is encrypted using senders private key and decrypted using receivers public key

3. Message is encrypted using receivers public key and decrypted using receivers private key

4. Message is encrypted using receivers private key and decrypted using receivers public key

95. Diffie-Hellmen Key exchange Algorithm can be used to

1. Encrypt/ decrypt message only.

2. Encrypt/decrypt message and Key exchange.

3.  Only for Key exchange and authentication not for encryption/decryption.

4. Key exchange.

96. The security of Diffie-Hellman key exchange relies on which assumption? 

1. It is computationally infeasible to compute a GCD of two large numbers. 

2. It is computationally infeasible to compute an inverse modulo prime p. 

3. It is computationally infeasible to test whether a large number is prime. 

4. It is computationally infeasible to solve the discrete log problem.

97. What is the objective of Diffie-Hellman key exchange?


1. To protect encrypted data from man-in-the-middle attack 

2. To perform mutual authentication on both sides 

3. To prove to another party that one holds a secret key without revealing it

4. To establish a shared secret key on both sides

98. Users A and B use the Diffie-Hellman key exchange technique with a common prime q = 71 and a primitive root a = 7.  If user A has
private key XA = 5, If user B has private key XB = 12.What is the shared secret key?

a. 30

b. 50

c. 21

d. 51

99. Users A and B use the Diffie-Hellman key exchange technique with a common prime q = 71 and a primitive root a = 4.  If user A has
private key XA = 5, If user B has private key XB = 3 What is the shared secret key?

a. 20

b. 30

c. 64

d. 3

100. ___________ algorithm is prone to Man in   middle Attack 

a. RSA

b. ElGamal

c. Elliptic Curve Cryptography

d. Diffie-Hellman key exchange

101.  Which asymmetric algorithm provides better security if key size is restricted to 512 bit 

a. Elliptic Curve Cryptography


b. Diffie-Hellman key exchange

c. RSA

d. ElGamal

102.  Which of  following statement is true 

a. AES is faster and secure compare to RSA for message encryption.

b. RSA is best option for encrypting large amount of data

c. ElGamal is symmetric cipher 

d. ECC is easy to implement compare to  RSA

103. Which of  following statement is true 

a. ElGamal algorithm can be used to create digital signature

b. Diffie-Hellman key exchange can be used for data authentication

c. Both a and b 

d. None of these

104. A block cipher can be converted into a stream cipher using

1. Electronic Codebook mode

2. Cipher Block Chaining mode

3. Cipher Feedback mode

4. None of these

105. In which of the following mode(s) each plain text block is encrypted independently 

a. Electronic Codebook mode

b. Cipher Block Chaining mode

c. Counter mode
d. both Electronic Codebook  and Counter mode

106. In which of the following  mode(s) the algorithm must complete the computation on one block before beginning on the next block

a. Cipher Block Chaining mode

b. Cipher Feedback mode

c.  Both Cipher Block Chaining & Cipher Feedback mode

d. None of these

107. In which of the following mode if the same b-bit block of plaintext appears more than once in the message, it always produces the
same ciphertext.

a. Electronic Codebook mode

b. Cipher Block Chaining mode

c. Counter mode

d. Cipher Feedback mode

108. Which of the following is true about RC 4 

a. RC 4 is a block cipher

b. RC 4 is a stream cipher with a fixed key size

c. RC 4 is a stream cipher with variable length key size

d. None  of these

109. The maximum key length supported by RC 4 is

a. 256 bits

b. 2048 bits

c. 128 bits

d. 512 bits

110. RC 4 is a public-key algorithm


a. true

b. false

111. Blum Blum Shub generator is based on

a. AES

b. DES

c. Hash

d. None of these

112. ANSI X9.17 PRNG is based on

a. RSA

b. AES

c. Triple DES

d. RC 4

113. 3 mod 137 = ?


140

114.  5 mod 241 = ?


243

115.  In Fermat’s theorem 

a. modulus p can be any integer

b. modulus p must be an odd integer

c. modulus p must be an even integer

d. modulus p must be a prime

116.  What is ϕ(39)?

a.  24
b. 38

c. 20

d. None of these

117. What is ϕ(57)?

a. 36

b. 56

c. 50

d. None of these

118. log (14)- discrete log of 14 to the base 13, modulo 19 is


13,19

a. 5

b. 10

c. 6

d. 9

119. log (12)- discrete log of 12 to the base 10, modulo 19 is


10,19

a. 3

b. 4

c. 5

d. 6

120.  In public-key cryptography sender can encrypt the message

a. using only receiver’s public key

b. using only sender’s private key

c. using either receiver’s public key or sender’s private key


d. using only receiver’s private key

121.  In public-key cryptography the message encrypted using sender’s private key

a. achieves only message secrecy

b. achieves only authentication

c. achieves both secrecy and authentication

d. such encryption is not possible

122.  In public-key cryptography the message encrypted using receiver’s public key

a. achieves only message secrecy

b. achieves only authentication

c. achieves both secrecy and authentication

d. such encryption is not possible

123.  Which of the following is/are not true

a. RSA is a symmetric key encryption algorithm

b. RSA is not a block cipher

c. RSA cannot be used for digital signature

d. All of these

124.  In RSA if public key of a user is {7, 33}. What is this user’s private key?

a. 3

b. 4

c. 5

d. 6

125.  In RSA if public key of a user is {3, 55}. What is this user’s private key?
a. 27

b. 11

c. 13

d. Does not exist

126.  In RSA if p=7, q=11, e=17 then what is cipher text of M=8?

a. 57

b. 8

c. 32

d. None of these

127. In RSA if p=5, q=11, e=3 then what is cipher text of M=19?

a. 39

b. 50

c. 42 

d. None of these

128.  Diffie-Hellman Key exchange algorithm can be used for

a. Encryption

b. Digital signature

c. both encryption and digital signature

d. none of these

129.  Diffie-Hellman key exchange algorithm’s effectiveness depends upon

a.  difficulty of computing discrete logarithms

b. difficulty of prime factorization


c. It is unconditionally secure

d. none of these

130.  The two global public parameters of Diffie-Hellman are q and α. What is α?

a. prime number

b. prime factor of q

c. primitive root of q

d. random integer

131.  3 is primitive root of 7.

a. true

b. false

132.  4 is primitive root of 7.

a. true

b. false

133.  In ElGamal cryptosystem it is possible to have different cipher text for same plaintext without changing the encryption key.

a. true

b. false 

134) Which of the following statement is/are true about hash functions?

i. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M)

ii. Hash functions are used in message authentication and digital signature

135) The SHA-512 algorithm takes as input a message with a maximum length of less than _____bits and produces as output a 512-bit
message digest.

136) Which of the following statement is/are true?

i. CMAC is cipher based message authentication code.


ii. In HMAC embedded hash function can be replaced by more secure hash function

137) Which of the following is/are requirements for a digital signature?

1. The signature must be a bit pattern that depends on the message being signed.
2. The signature must use some information unique to the sender
3. It must be relatively easy to produce the digital signature.
4. All of these
138) Which of the following is/are type(s) of intruders?
1. Masquerader
2. Misfeasor
3. Clandestine user
4. All of these

139) Which of the following is/are technique(s) for the distribution of public keys?
1. Public announcement

2. Publicly available directory

3. Public-key certificates

4. All of these

140) Which of the following is not a SSL protocol?


1. HTTP
2. Handshake protocol
3. Change Cipher Spec Protocol
4. Alert Protocol

141) Digital Signature Standard (DSS) can be used for ____


1. Encryption/Decryption
2. Digital Signature
3. Key Exchange
4. None of these

142) In PGP, for message encryption which of the following cannot be used?
a. CAST
b. Blowfish
c. Three key Triple DES
d. IDEA
143) A _____ is a program that can replicate itself and send copies from computer to computer across network connections.
a. Virus
b. Worm
c. Trojan horse
d. Logic bomb
144) _______ are decoy systems that are designed to lure a potential attacker away from critical systems.
1. Honeypots
2. Audit record
3. Markov process
4. Gauge
145) In PGP for achieving E-mail compatibility which of the following is used?
a. Radix 64 conversion
b. ZIP
c. CAST
d. IDEA
146) In SHA-512 each message block is processed by a compression function consisting of ______ rounds (steps).

a. 16
b. 64
c. 80
d. 128
147) Which of the following is/are elements of Public Key Infrastructure?
1. Certification Authority
2. Registration Authority
3. CRL issuer
4. All of these
148) Which of the following is/are reason(s) to revoke a user’s certificate?
1. The user’s private key is assumed to be compromised.
2. The user is no longer certified by this CA.
3. The CA’s certificate is assumed to be compromised.
4. All of these
149) A _____ is a apparently useful program containing hidden code that, when invoked, performs some unwanted or harmful function.
a. Trojan horse
b. Stealth virus
c. Boot sector virus
d. Logic bomb
150) Which of the following is a type of firewalls?
a. Packet filters
b. Application-level gateways
c. Circuit-level gateways
d. All of these

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy