0% found this document useful (0 votes)
48 views6 pages

Usha Mittal Institute of Technology

The document appears to be a practice test for a coding theory and cryptography course. It contains 20 multiple choice questions related to topics like data security principles, cryptographic keys, encryption algorithms like AES, Hill cipher, Playfair cipher, and Vigenere cipher. The test is being administered on October 14, 2021 from 4:00-5:00 PM at Usha Mittal Institute of Technology.

Uploaded by

Mamta Deshmukh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views6 pages

Usha Mittal Institute of Technology

The document appears to be a practice test for a coding theory and cryptography course. It contains 20 multiple choice questions related to topics like data security principles, cryptographic keys, encryption algorithms like AES, Hill cipher, Playfair cipher, and Vigenere cipher. The test is being administered on October 14, 2021 from 4:00-5:00 PM at Usha Mittal Institute of Technology.

Uploaded by

Mamta Deshmukh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

10/14/21, 4:20 PM Usha Mittal Institute of Technology

Usha Mittal Institute of Technology


UNIT TEST- 1

Subject: Coding Theory and Cryptography

Branch :ENC/EE Marks: 25 Objective Test Time :4.00- 5.00 Date :


14/10/2021

deshmukh.mamta.md@gmail.com (not shared) Switch account

Draft saved

Mamta Deshmukh

Your answer

Branch

ENC

EE

Clear selection

https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 1/6
10/14/21, 4:20 PM Usha Mittal Institute of Technology

Which of the following is not a principle of data security?

Data Confidentiality

Data Integrity

Authentication

None of the above

Clear selection

A key is a string of bits used by a cryptographic algorithm to transform plain text


into ciphertext." Which of the following is capable of becoming a key in a
cryptographic algorithm?

An integer values

A square matrix

An array of characters (i.e. a string)

All of the above

o encrypt the plaintext, a cryptographic algorithm works in combination with a


key...

Word, number, or phrase

Special Symbols

Function Keys

All of these

https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 2/6
10/14/21, 4:20 PM Usha Mittal Institute of Technology

Conventional cryptography also known as ... encryption.

asymmetric-key

logical-key

symmetric-key

None of these

Security Goals of Cryptography are

Confidentiality

Authenticityn

Data integrityn

Non-repudiation

All of these

You are supposed to use hill cipher for encryption technique. You are provided
with the following matrix,A = [ 4 2 ] [2 1]

Yes

No

Can't be determined

Data insufficient

https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 3/6
10/14/21, 4:20 PM Usha Mittal Institute of Technology

What will be the ciphered text if the string “SANFOUNDRY” is given as input to
the code of playfair cipher with keyword as “SECRET” (assuming j is combined
with i)?

ZHQAPNPAFR

AHQAPNPAFR

HAQAPNPAFR

QHAAPNPAFR

Vigenere table consists of

26 rows and 26 columns

26 rows and 1 column

1 row and 26 columns

27 rows and 27 columns

What will be the ciphered text if the string “SANFOUNDRY” is given as input to
the code of vigenere cipher with keyword as “HELLO”?

UEWIIDKLL

ZEYQCOCM

ZEYQCBROCM

ZEYQCBROCMJDH

https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 4/6
10/14/21, 4:20 PM Usha Mittal Institute of Technology

Which one of the following modes of operation in DES is used for operating short
data?

Cipher Feedback Mode (CFB)

Cipher Block chaining (CBC)

Electronic code book (ECB)

Output Feedback Modes (OFB)

Choose from among the following cipher systems, from best to the worst, with
respect to ease of decryption using frequency analysis.

Random Polyalphabetic, Plaintext, Playfair

Random Polyalphabetic, Playfair, Vignere

Random Polyalphabetic, Vignere, Playfair, Plaintext

Random Polyalphabetic, Plaintext, Beaufort, Playfair

On Encrypting “cryptography” using Vignere Cipher System using the keyword


“LUCKY” we get cipher text

nlazeiibljji

nlazeiibljii

olaaeiibljki

mlaaeiibljki

https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 5/6
10/14/21, 4:20 PM Usha Mittal Institute of Technology

AES uses a ________ bit block size and a key size of _____ bits.

128;128 or 256

64 ; 128 or 192

256; 128,192 or 256

128; 128,192 or 256

Submit Clear form

Never submit passwords through Google Forms.

This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy

 Forms

https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 6/6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy