Cryptography MCQ Questions
Cryptography MCQ Questions
Cryptography MCQ Questions
1. The process of disguising plaintext in such a way that its substance gets hidden (into what
is known as cipher-text) is called _________________.
a) cryptanalysis
b) decryption
c) reverse engineering
d) encryption
2. Which of the following is not the primary objective of cryptography?
a) Confidentiality
b) Data Integrity
c) Data Redundancy
d) Authentication
3. Which of the following is a principle of data security?
a) Data Confidentiality
b) Data Integrity
c) Authentication
d) All of the above
4. Which of the following attack is a passive attack?
a) Masquerade
b) Modification of message
c) Denial of service
d) Traffic analysis
5. Which of the following options correctly defines the Brute force attack?
a) Brutally forcing the user to share the useful information like pins and passwords.
b) Trying every possible key to decrypt the message.
c) One entity pretends to be some other entity.
d) The message or information is modified before sending it to the receiver.
6. “A key is a string of bits used by a cryptographic algorithm to transform plain text into
cipher text.” Which of the following is capable of becoming a key in a cryptographic
algorithm?
a) An integer values
b) A square matrix
c) An array of characters (i.e. a string)
d) All of the above
7. In general how many key elements constitute the entire security structure?
a) 1 b) 2 c) 3 d) 4
8. According to the CIA, which of the below-mentioned element is not considered in the
triad?
a) Confidentiality
b) Integrity
c) Authenticity
d) Availability
9. This is the model designed for guiding the policies of Information Security within a
company, firm or organization. What is “this” referred to here?
a) Confidentiality
b) Non-repudiation
c) CIA
d) Authenticity
10. When you use the word _____ it means you are protecting your data from getting
disclosed.
a) Confidentiality
b) Integrity
c) Authentication
d) Availability
11. ______ means the protection of data from modification by unknown users.
a) Confidentiality
b) Integrity
c) Authentication
d) Non-repudiation
12. When integrity is lacking in a security system, _________ occurs.
a) Database hacking
b) Data deletion
c) Data tampering
d) Data leakage
13. _______ of information means, only authorized users are capable of accessing the
information.
a) Hiding
b) Integrity
c) Non-repudiation
d) Availability
14. Why these 3 elements (confidentiality, integrity, availability) are considered
fundamental?
a) They help understanding hacking better
b) They help to understand the cyber-crime better
c) They help understanding security and its components better
d) None of the above
15. This helps in identifying the origin of information and authentic user. This referred to
here as __________.
a) Confidentiality
b) Integrity
c) Authenticity
d) Availability
16. Data ___________ is used to ensure confidentiality.
a) Encryption
b) Locking
c) Deleting
d) Backup
17. Which of these is not a proper method of maintaining confidentiality?
a) Biometric verification
b) ID and password based verification
c) 2-factor authentication
d) Switching off the phone
18. Data integrity gets compromised when _____ is not done properly.
a) Data hiding
b) Access control
c) Network management
d) None of the above
19. One common way to maintain data availability is __________
a) Data clustering
b) Data backup
c) Data recovery
d) Data Altering
20. _______ is the practice and precautions taken to protect valuable information from
unauthorized access, recording, disclosure or destruction.
a) Network Security
b) Database Security
c) Information Security
d) Physical Security
21. From the options below, which of them is not a threat to information security?
a) Disaster
b) Eavesdropping
c) Information leakage
d) Unchanged password
22. Compromising confidential information comes under _________
a) Bug
b) Threat
c) Vulnerability
d) None of the above
23. Lack of access control policy is a _____________
a) Data backup
b) Security
c) Vulnerability
d) None of the above
24. Which is not an objective of network security?
a) Integrity
b) Authentication
c) Access control
d) Lock
25. Which of the following security feature controls who can access resources in the OS?
a) Authentication
b) Identification
c) Validation
d) Access control
26. The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
27. The process of transforming plain text into unreadable text.
a) Decryption
b) Encryption
c) Network Security
d) Information Hiding
28. A process of making the encrypted text readable again is _______.
a) Decryption
b) Encryption
c) Network Security
d) Information Hiding
29. A unique piece of information (readable) that is used in encryption is _______.
a) Cipher text
b) Plain Text
c) Key
d) None of the above
30. A cryptosystem is also termed as __________.
a) secure text
b) cipher system
c) cipher text
d) secure algorithm
31. Study of creating and using encryption and decryption techniques is called
a) Cipher
b) Cryptography
c) Encryption
d) Decryption
32. Cryptography offers a set of required security services. Which of the following is not
among that 4 required security services?
a) Encryption
b) Message Authentication codes
c) Hash functions
d) Cryptanalysis
33. __________ assures that individuals control what information related to them may be
collected and stored and by whom and to whom that information may be disclosed.
a) Availability
b) System Integrity
c) Confidentiality
d) Data Integrity
34. ________ assures that a system performs its intended function in an unimpaired manner,
free from unauthorized manipulation of the system.
a) System Integrity
b) Data Integrity
c) Availability
d) Confidentiality
35. A loss of _________ is the unauthorized disclosure of information.
a) confidentiality
b) integrity
c) authenticity
d) availability
36. A _________ is an attempt to learn or make use of information from the system that does
not affect system resources.
a) passive attack
b) inside attack
c) outside attack
d) active attack
39. The _________ prevents the normal use or management of communications facilities.
a) passive attack
b) traffic encryption
c) denial of service
d) masquerade
40. A __________ is any action that compromises the security of information owned by an
organization.
a) security mechanism
b) Security attack
c) security policy
d) Security service
41. The assurance that data received are exactly as sent by an authorized entity is
__________.
a) authentication
b) data confidentiality
c) access control
d) data integrity
42. Cryptographic algorithms are based on mathematical algorithms where these algorithms
use ___________ for a secure transformation of data.
a) secret key
b) external programs
c) add-ons
d) none of the above
44. __________ is a mathematical algorithm that produces a unique plain text for a given
cipher text along with a decryption key.
a) Decryption algorithm
b) Hashing algorithm
c) Tuning algorithm
d) Encryption algorithm
45. The “A” in the CIA triad stands for _________.
a) Availability
b) Access control
c) Authentication
d) None of the above
46. _______________ takes the plain text and the key as input for creating cipher-text.
a) Decryption Algorithm
b) Hashing Algorithm
c) Tuning Algorithm
d) Encryption Algorithm
47. State true or false: Availability assures that systems works promptly and service is not
denied to authorize users.
48.___________ is the art and science of cracking the cipher-text without knowing the key.
a) Cracking
b) Cryptanalysis
c) Cryptography
d) Crypto-hacking
49. The OSI security architecture focuses on security attacks, __________, and services.
a) Mechanism
b) policy
c) technique
d) none of the above
50. Data which is easily readable and understandable without any special algorithm or method
is called _________________
a) cipher-text
b) plain text
c) raw text
d) encrypted text
Unit 2: Encryption Techniques
1. Which cipher encrypts a data stream one bit or one byte at a time?
a) Stream cipher
b) Block cipher
c) A and b both
d) None of above
2. In which cipher a block of plaintext is treated as a whole and used to produce a cipher
text block of equal length?
a) Stream cipher
b) Block cipher
c) A and b both
d) None of above
a) DES
b) Vigenere cipher
c) A and b both
d) None of above
a) DES
b) Vigenere cipher
c) A and b both
d) None of above
a) Diffusion
b) Confusion
c) Stream cipher
d) Block cipher
6. In _________seeks to make the relationship between the statistics of the ciphertext and
the value of the encryption key as complex as possible.
a) Diffusion
b) Confusion
c) Stream cipher
d) Block cipher
7. DES follows__________.
a) Hash Algorithm
b) Caesars Cipher
d) SP Networks
a) 12
b) 18
c) 9
d) 16
a) 128 Bits
b) 32 Bits
c) 64 Bits
d) 16 Bits
b) 16 bits
c) 20 bits
d) 10 bits
a) 24 bits
b) 16 bits
c) 20 bits
d) 8 bits
a) 2
b) 3
c) 4
d) 16
a) Symmetric
b) Asymmetric
c) A and b both
d) None of above
14. “A small change in either the plaintext or the key should produce a significant change in
the ciphertext” this property is known as _________.
16. Assume input 10-bit key, K: 1010000010, P10 = 1000001100, P8 = 0000111000 for the
SDES algorithm. What is K1?
a) 10100100
b) 01011011
c) 01101000
d) 10100111
a) Block size
b) Key size
c) Number of rounds
d) All of above
a) 7
b) 8
c) 10
d) 12
20. What is the input to the S-box in DES algorithm?
a) 4 bits
b) 2 bits
c) 5 bits
d) 6 bits
a) 4 bits
b) 2 bits
c) 5 bits
d) 6 bits
22. ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula
to define the relationship between the input stream and the output stream.
a) S-box
b) P-box
c) T-box
d) none of the above
a) symmetric-key
b) asymmetric-key
d) None of above
24. What values we get after applying one round shift circulate (LS-1) on each half of the
bits? Where,
25. What values we get after applying one round shift circulate (LS-2) on each half of the
bits? Where,
26. The ______ is obtained from plaintext by iterating a function F over some number of
rounds.
a) Key value
b) Ciphertext
c) Original message
d) None of above
a) blocks
b) Group
c) Byte
d) None of above
28. In a block cipher, the function F which depends on the output of the previous round and
the key K is known as a __________
a) Round function.
b) Merry-go-round.
c) Ring function.
d) Round algorithm
29. Which of the following encryption algorithms is based on the Fiestal struture?
a) Advanced Encryption Standard
d) RC4
31. If value of master key is 1010000010 and P10 = 3 5 2 7 4 10 1 9 8 6 then what is value
generated after permutation?
a) 0100100010
b) 1000001100
c) 1000101100
d) 1000001110
32. If value of master key is 0111010001 and P10 = 3 5 2 7 4 10 1 9 8 6 then what is value
generated after permutation?
a) 1001100010
b) 1000100110
c) 1010110001
d) 1010010001
33. If value of master key is 1011000110 and P10 = 3 5 2 7 4 10 1 9 8 6 then what is value
generated after permutation?
a) 1000101110
b) 1000111111
c) 1100110011
d) 1100111110
34. In feistel cipher ________ key is used for each round.
a) Same
b) Separate
c) Encrypted
d) None of above
35. How many keys are generated using SDES key generation algorithm?
a) 2
b) 3
c) 8
d) 16
36. SDES key generation algorithm a ____bit key as input and produces an ____bit block of
ciphertext as output.
a) 8, 10
b) 8, 8
c) 10, 8
d) 10 ,10
a) Initial Partition
b) Initial Permutation
c) Inverse Permutation
d) Inverse Partition
38. What values we get after applying two round shift circulate (LS-2) on each half of the
bits? Where,
39. What values we get after applying two round shift circulate (LS-2) on each half of the
bits? Where,
40. What values we get after applying two round shift circulate (LS-2) on each half of the
bits? Where,
a) 00100100
b) 10011000
c) 00100101
d) 10001001
a) 10010000
b) 10110001
c) 10110000
d) 100010001
43. If we have string of 4 bit = 0110, what is the value we get after applying
expansion/permutation (E/P)? where,
E/P
4 1 2 3 2 3 4 1
a) 00101110
b) 00101001
c) 00111100
d) 11000011
44. If we have string of 4 bit = 0010, what is the value we get after applying
expansion/permutation (E/P)? where,
E/P
4 1 2 3 2 3 4 1
a) 00101110
b) 00101001
c) 00010100
d) 00010010
a) Round function
b) Swapping function
c) Initial permutation
d) Inverse initial permutation
a) DES algorithm
b) substitution-permutation network
c) A and b both
d) None of above
a) Plaintext
b) Ciphertext
c) Original text
d) None of above
49. In fesitel structure _________ key size, _________ security and __________
encryption/decryption speed.
50. In fesitel structure _________ block size, _________ security and __________
encryption/decryption speed.
a) Two
b) One
c) A and b both
d) None of above
a) n = 72, ⌀(n) = 91
b) n = 84, ⌀(n) = 72
c) n = 91, ⌀(n) = 84
d) n = 91, ⌀(n) = 72
a) n = 14, ⌀(n) = 33
b) n = 14, ⌀(n) = 20
c) n = 33, ⌀(n) = 20
d) n = 33, ⌀(n) = 14
a) Public-Key Certificates
b) Hashing Certificates
d) Public-Key authority
a) Public-Key Certificates
b) Public announcements
a) Public-Key Certificates
b) Public announcements
c) Publicly available directories
d) Public-Key authority
a) Public-Key Certificates
b) Public announcements
c) Public-Key authority
d) None of the mentioned
9. If Bob wants to send an encrypted message to Alice using a public key cryptosystem,
which key does he use to encrypt the message?
10. If Richard wants to send an encrypted message to Sue using a public key cryptosystem,
which key does he use to encrypt the message?
11. If plaintext (M) = 88, e = 7 and n = 187 than find Ciphertext (C) using RSA algorithm.
a) 10
b) 11
c) 12
d) 13
a) Sender’s private key for encryption and sender’s public key for decryption
b) Sender’s private key for encryption and receiver’s public key for decryption
c) Receiver’s private key for encryption and receiver’s public key for decryption
d) Receiver’s private key for encryption and sender’s public key for decryption
a) Sender’s public key for encryption and sender’s public key for decryption
b) Sender’s private key for encryption and receiver’s public key for decryption
c) Receiver’s public key for encryption and receiver’s private key for decryption
d) Receiver’s private key for encryption and sender’s public key for decryption
14. When Alice receive message from Bob and decrypted with her private key then message was
encrypted with _________.
15. For RSA to work, the value of p must be less than the value of _______.
a) p
b) q
c) n
d) r
16. In asymmetri-key cryptography, although RSA can be used to encrypt and decrypt actual
messages, it is very slow if the message is_______
a) Short
b) Long
c) Flat
d) Thin
a) M = Cn mod e
b) C = Me mod n
c) C = M mod n
d) M = C mod e
a) M = Cn mod e
b) C = Me mod n
c) C = M mod n
d) M = C mod e
20. Communication between end systems is encrypted using a key, often known as
a) temporary key
b) section key
c) line key
d) session key
21. Session keys are transmitted after being encrypted by
a) make-shift keys
b) temporary keys
c) master keys
d) section keys
22. How many handshake rounds are required in the Public-Key Distribution Scenario?
a) 7
b) 5
c) 3
d) 4
a) Encryption key
b) Decryption key
a) (p)/(q)
b) (p)(q)
c) (p-1)(q-1)
d) (p+1)(q+1)
25. In public key cryptosystem _____ keys are used for encryption and decryption.
a) Same
b) Different
c) Encryption Keys
a) Encryption keys
b) Decryption keys
28. One commonly used public-key cryptography method is the ______ algorithm.
a) RSS
b) RAS
c) RSA
d) RAA
29. The secret key between members needs to be created as a ______ key when two members
contact KDC.
a) public
b) session
c) complimentary
a) KDC
b) CA
c) KDD
a) To Send message
b) To identify this transaction uniquely
c) To generate message
d) None of above
a) Public announcement
b) Publicly available directories
c) Simple Secret Key Distribution
d) None of above
33. A digital document issued and digitally signed by the private key of a Certification Authority
that binds the name of a subscriber to a public key is known as ____________.
a) key certificate
b) Key Certificate
c) Session key certificate
d) None of above
34. In which cryptographic algorithm that uses two related keys, a public key and a private key?
a) 29
b) 30
c) 31
d) 32
36. If ciphertext (C) = 30, d = 3 and n = 33 than find plaintext (M) using RSA algorithm.
a) 6
b) 7
c) 8
d) 9
37. If ciphertext (C) = 11, e = 7 and n = 187 than find plaintext (M) using RSA algorithm.
a) 87
b) 88
c) 12
d) 13
a) n = 21, ⌀(n) = 10
b) n = 10, ⌀(n) = 21
c) n = 21, ⌀(n) = 12
d) n = 10, ⌀(n) = 12
a) 5
b) 6
c) 7
d) 8
40. If values of e = 7 and ⌀(n) = 20, than find d using RSA algorithm.
a) 3
b) 4
c) 7
d) 8
41. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is
the property of ‘p’ and ‘q’?
a) M=Cd mod N
b) M=eC mod N
c) M=N mod Ce
d) M=N mod eC
43. In which of the following algorithm two large prime numbers must be selected?
a) DES
b) RSA
c) Caeser cipher
d) Playfair cipher
a) C=Me mod n
b) C=eM mod n
c) C=n mod Me
d) C=n mod eM
a) Certificate authorities
b) Controlled activities
c) Certification authority
d) Certificate anomaly
47. What are the value of p and q, when n = 187 and ⌀(n) = 160?
a) p = 11, q = 17
b) p = 10, q = 16
c) p = 11, q = 18
d) p = 12, q = 17
48. What are the value of p and q, when n = 55 and ⌀(n) = 40?
a) p = 10, q = 4
b) p = 10, q = 11
c) p = 11, q = 5
d) p = 11, q = 4
49. What are the value of p and q, when n = 35 and ⌀(n) = 24?
a) p = 12, q = 2
b) p = 8, q = 3
c) p = 6, q = 4
d) p = 5, q = 7
a) Public key
b) Private key
c) Both
d) None
a) Substitution technique
b) Transposition technique
c) Asymmetric key cryptography
d) Symmetric key cryptography
54. If message is encrypted with receiver’s public key, __________ key is used for
decryption.
55. If message is encrypted with sender’s private key, __________ key is used for
decryption.
a) E(Key,Text)
b) E(Text,Key)
c) D(Key,Text)
d) D(Text,Key)
a) Plaintext
b) Ciphertext
c) Hash function
d) Key
58. User A decrypt message Y using PUb then what will be the generated plaintext X?
59. Which of the followings are applications of public key crypto system?
61. If n=35 then what will be the value of euler’s totient function?
a) 7 b) 12 c) 35 d) 24
62. If n=6 then what will be the value of euler’s totient function?
a) 6 b) 2 c) 5 d) 8
a) 5 b) 6 c) 4 d) 3
64. __________ is gcd of 55 and 22.
a) 11 b) 12 c) 13 d) 14
a) 2 b) 3 c) 4 d) 5
a) 6 b) 7 c) 8 d) 9
a) 17 b) 11 c) 160 d) 187
69. If n=21 then what will be the value of euler’s totient function?
a) 21 b) 12 c) 13 d) 22
70. If n=77 then what will be the value of euler’s totient function?
a) 40 b) 50 c) 60 d) 77
72. In __________, any participant can broadcast the key to the community at large.
a) Public-Key Certificates
b) Public announcements
d) Public-Key authority
a) Public-Key Certificates
b) Public announcements
a) Confidentiality
b) Authentication
c) Decryption
d) None
a) Secrecy
b) Authentication
c) Both
d) None
78. In _________ attack, the opponent has some idea about the plaintext and he uses this
information to find the private key.
a) Probable message attack
b) Brute force attack
c) DoS attack
d) None
i) It must verify the author and the date and time of the signature.
2. What are the essential things that are necessary for the digital signature?
3. In public key encryption system if A encrypts a message using his private key and sends
it to B
a) A scanned signature
c) Encrypting information
d) Handwritten signature
c) none
d) a&b
a) it protects two parties who exchange messages from any third party
b) none
c) a&d
b) input function
c) output function
d) b&c
10. Which are the necessary in the aspect of the DDS (Direct Digital Signature)
a) time stamp
b) none
d) a & c
11. Which of the followings are true for Arbitrated Digital Signature?
d) all of above
d) a&c
c) a and b both
d) None
c) a&b
d) none
a) Timeliness
b) Confidentiality
c) None
d) a&b
b) none
d) a&c
a) none
c) b&d
d) all
b) all
d) none
21. What are the components of the Replay attack using symmetric encryption?
c) secret key
d) all
d) all of above
a) Authentication Server
d) None
c) None
d) A and b both
26. What is the purpose of using symmetric encryption in one way authentication?
c) none of above
d) a&b
d) none of above
d) None of above
29. The advanced version of DSS by using the Secure Hash Algorithm is known as?
a) Digital Signature Algorithm
c) A&b
d) None
a) 128 bit
b) 256 bit
c) 320 bit
d) 512 bit
a) ElGamal
b) Schnorr
c) a & b
d) none
a) message hash
d) all
33. What is the value of public key derived from Digital Signature Algorithm?
a) y = gx (mod p)
b) y = hx (mod p)
c) y = gx (mod h)
d) None of above
34. What is the necessary condition for generating random signature key in Digital Signature
Algorithm?
a) k<q
b) k<=q
c) k>q
d) k=q
35. What is the formula to compute signature pair in Digital Signature Algorithm?
a) r = (hk(mod p))(mod q)
s = (k-1.H(M)+ x)(mod g)
b) r = (hk(mod p))(mod g)
s = (k1.H(M)+ x)(mod q)
c) r = (gk(mod p))(mod g)
s = (p-1.H(M)+ x.r)(mod g)
d) r = (gk(mod p))(mod q)
s = (k-1.H(M)+ x.r)(mod q)
a) v!=r
b) v>r
c) v<r
d) v=r
a) Authentication
b) Integrity
c) A and b both
d) None of above
a) 320 bit
b) 230 bit
c) 20 bit
d) 30 bit
a) Smaller, slower
b) Smaller, faster
c) Larger, faster
d) Larger, slower
48. A digital signature may be formed by encrypting the entire message with the _________
a) sender’s private key
b) sender’s public key
c) Receiver’s private key
d) None of above
49. A digital signature may be formed by encrypting _______of the message with the
sender’s private key.
a) a hash code
b) a hash function
c) a MAC
d) None of above
a) generated
b) Verifiable
c) A and b both
d) None of above
51. State the following statement is true or false: The signature must be a bit pattern that
depends on the message being signed.
a) Timestamp
b) Timeclock
c) Timesync
d) None