50% found this document useful (2 votes)
25K views3 pages

The Art of Cryptography

The document discusses various topics related to cryptography including encryption algorithms, ciphers, hash functions, and cryptographic attacks. It tests knowledge on concepts like the Enigma machine, RSA, AES, MD5, public key cryptography, Diffie-Hellman key exchange, and properties of cryptographic systems like Kerckhoff's principle and complexity. Multiple choice questions are asked about algorithms, ciphers, hash functions, digital signatures, attacks like man-in-the-middle and frequency analysis.

Uploaded by

Cachues Profile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
25K views3 pages

The Art of Cryptography

The document discusses various topics related to cryptography including encryption algorithms, ciphers, hash functions, and cryptographic attacks. It tests knowledge on concepts like the Enigma machine, RSA, AES, MD5, public key cryptography, Diffie-Hellman key exchange, and properties of cryptographic systems like Kerckhoff's principle and complexity. Multiple choice questions are asked about algorithms, ciphers, hash functions, digital signatures, attacks like man-in-the-middle and frequency analysis.

Uploaded by

Cachues Profile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

DIGITAL SECURITY > THE ART OF CRYPTOGRAPHY

- Encryption helps protect data against __________


ALL THE OPTIONS (wrong)
FORGERY

- Which of the following poses challenges in the breaking of the Vigenère Cipher?
SECRECY OF KEY (wrong)

- Secret Key Cryptography is effective for communication over insecure channels.


FALSE

- The process that attempts to understand the art and science of encryption and decryption is
known as __________.
CRYPTOGRAPHY (wrong)

- Which of the following is most suitable to secure passwords?


AUTHENTICATION (wrong)

- The cryptographic device based on rotor systems, used by the Germans during World War II is
___
ENIGMA

- The security principle that contradicts the idea of “security through obscurity” is _________.
KERCHOFF'S PRINCIPLE

- The cipher generated by combining multiple transformations to enhance the security of the
resultant cipher is __________.
POLYALPHABETIC CIPHERS

- The strategy used to ensure that the message is a multiple of the cipher block size without
compromising the size of the ciphertext is ___
CIPHERTEXT STEALING

- RSA is a Deterministic Encryption Algorithm as there is no random component.


TRUE

- A widely used encryption algorithm that superseded DES as the new standard encryption
algorithm is ________.
RIJNDAEL

- RC4 is a block cipher.


FALSE
- The algorithm that is considered to have electrified non-military cryptology and cryptanalysis is
________.
VERNAM CIPHER

- Based on the network security protocols, which of the following algorithms are used to
generate message digests?
MD5

- In digital cryptography, each character is represented as__________.


8 BITS

- Which of the following cryptographic strategies may be used to overcome Man-in-the-Middle


attacks?
ENCRYPTION

- The cryptographic method that is considered to be genuinely unbreakable is ________.


ONE-TIME PAD

- The number of keys used in Triple DES algorithm is __________.


3

- Which among the following are steps in each round of AES algorithm?
SUBSTITUTE BYTES

- X signs a message digitally and sends it to Y. Which of the following is required for Y to verify
the authenticity of the message?
X'S PUBLIC KEY

- Which among the following is the most desirable property to enhance the computational
complexity of cryptosystems?
COMPLEXITY OF THE ALGORITHM

- Which among the following algorithms is designed based on the Feistel Cipher?
DES

- Digital Signature is implemented using the ____


PUBLIC KEY SYSTEM

- The Diffie-Hellman algorithm exploits the computational complexity of the __________


problem.
DISCRETE LOGARITHM

- Frequency analysis can be performed on polyalphabetic ciphers, which makes it weak.


TRUE

- Transmission errors are propagated in the following modes, except __________.


OUTPUT FEEDBACK MODE

- Which among the following best describes hash collision attack?


DIFFERENT INPUT STRINGS, SAME HASH RESULT

- The size of the output produced by hash functions is __________


FIXED BASED ON THE HASH ALGORITHM

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy