Académique Documents
Professionnel Documents
Culture Documents
Cryptography
Compilation of all the quizzes (MCQs) for each and every chapters in the book of Data
Communications and Networking 4th Edition by Behrouz A. Forouzan.
1|P age
MCQs in Cryptography
www.PinoyBIX.com
1. One commonly used public-key C) T-box
cryptography method is the ______ D) none of the above
algorithm. 7. A ________ cipher replaces one
A) RSS character with another character.
B) RAS A) substitution
C) RSA B) transposition
D) RAA C) either (a) or (b)
2. A(n) ______ algorithm transforms D) neither (a) nor (b)
ciphertext to plaintext. 8. The ________ cipher reorders the
A) encryption plaintext characters to create a
B) decryption ciphertext.
C) either (a) or (b) A) substitution
D) neither (a) nor (b) B) transposition
3. The ________ is the message after C) either (a) or (b)
transformation. D) neither (a) nor (b)
A) ciphertext 9. _______ is a round cipher based on
B) plaintext the Rijndael algorithm that uses a 128-bit
C) secret-text block of data.
D) none of the above A) AEE
4. A(n) _______ algorithm transforms B) AED
plaintext to ciphertext. C) AER
A) encryption D) AES
B) decryption 10. The ________is the original message
C) either (a) or (b) before transformation.
D) neither (a) nor (b) A) ciphertext
5. The ________ method provides a one- B) plaintext
time session key for two parties. C) secret-text
A) Diffie-Hellman D) none of the above
B) RSA 11. A modern cipher is usually a complex
C) DES _____cipher made of a combination of
D) AES different simple ciphers.
6. A(n) ______ is a keyless substitution A) round
cipher with N inputs and M outputs that B) circle
uses a formula to define the relationship C) square
between the input stream and the output D) none of the above
stream. 12. The _________ attack can endanger
A) S-box the security of the Diffie-Hellman method
B) P-box
2|P age
MCQs in Cryptography
www.PinoyBIX.com
if two parties are not authenticated to 18. The Caesar cipher is a
each other. _______cipher that has a key of 3.
A) man-in-the-middle A) transposition
B) ciphertext attack B) additive
C) plaintext attack C) shift
D) none of the above D) none of the above
13. A combination of an encryption 19. ECB and CBC are ________ ciphers.
algorithm and a decryption algorithm is A) block
called a ________. B) stream
A) cipher C) field
B) secret D) none of the above
C) key 20. A(n) _______is a keyless
D) none of the above transposition cipher with N inputs and M
14. In an asymmetric-key cipher, the outputs that uses a table to define the
receiver uses the ______ key. relationship between the input stream
A) private and the output stream.
B) public A) S-box
C) either a or b B) P-box
D) neither (a) nor (b) C) T-box
15. AES has _____ different D) none of the above
configurations. 21. ________ DES was designed to
A) two increase the size of the DES key.
B) three A) Double
C) four B) Triple
D) five C) Quadruple
16. DES is a(n) ________ method D) none of the above
adopted by the U.S. government. 22. ________ is the science and art of
A) symmetric-key transforming messages to make them
B) asymmetric-key secure and immune to attacks.
C) either (a) or (b) A) Cryptography
D) neither (a) nor (b) B) Cryptoanalysis
17. DES uses a key generator to C) either (a) or (b)
generate sixteen _______ round keys. D) neither (a) nor (b)
A) 32-bit 23. DES has an initial and final
B) 48-bit permutation block and _________
C) 54-bit rounds.
D) 42-bit A) 14
B) 15
3|P age
MCQs in Cryptography
www.PinoyBIX.com
C) 16 B) asymmetric-key
D) none of the above C) either (a) or (b)
24. The DES function has _______ D) neither (a) nor (b)
components. 30. The _______ is a number or a set of
A) 2 numbers on which the cipher operates.
B) 3 A) cipher
C) 4 B) secret
D) 5 C) key
25. In a(n) ________ cipher, the same D) none of the above
key is used by both the sender and 31. In a(n) ________, the key is called
receiver. the secret key.
A) symmetric-key A) symmetric-key
B) asymmetric-key B) asymmetric-key
C) either (a) or (b) C) either (a) or (b)
D) neither (a) nor (b) D) neither (a) nor (b)
26. _________ ciphers can be
categorized into two broad categories:
monoalphabetic and polyalphabetic.
A) Substitution
B) Transposition
C) either (a) or (b)
D) neither (a) nor (b)
27. The _______ cipher is the simplest
monoalphabetic cipher. It uses modular
arithmetic with a modulus of 26.
A) transposition
B) additive
C) shift
D) none of the above
28. In an asymmetric-key cipher, the
sender uses the__________ key.
A) private
B) public
C) either (a) or (b)
D) neither (a) nor (b)
29. In a(n) ________ cipher, a pair of
keys is used.
A) symmetric-key
4|P age
MCQs in Cryptography
www.PinoyBIX.com