Computer Hardware and Networking MCQ Quiz Hub

Information and Network Security Set 2

Choose a topic to test your knowledge and improve your Computer Hardware and Networking skills

1. The main motive for using steganography is that hackers or other users can hide a secret message behind a ______________.




2. People will normally think it as a normal/regular file and your secret message will pass on without any _____________




3. By using ______________ you can diminish the chance of data leakage.




4. Which mode of operation has the worst “error propagation” among the following?




5. Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?




6. Which mode requires the implementation of only the encryption algorithm?




7. Which of the following modes of operation does not involve feedback?




8. Which of the following is a natural candidates for stream ciphers?




9. Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?




10. Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen asthe AES algorithm?




11. How many rounds does the AES-192 perform?




12. What is the expanded key size of AES-192?




13. The 4×4 byte matrices in the AES algorithm are called_____




14. In AES the 4×4 bytes matrix key is transformed into a keys of size __________.




15. For the AES-128 algorithm there are __________ similar rounds and _________ roundis different.




16. There is an addition of round key before the start of the AES round algorithms.




17. How many computation rounds does the simplified AES consists of?




18. On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?




19. What is the block size in the Simplified AES algorithm?




20. . What is the block size in the Simplified AES algorithm?




21. What is the key size in the S-AES algorithm?




22. Which of the following is a faulty S-AES step function?




23. How many step function do Round 1 and 2 each have in S-AES?




24. The inverse transformation matrix times the forward transformation matrix equals the identity matrix.




25. How many round keys are generated in the AES algorithm?




26. DES follows_________.




27. The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a round key.




28. The DES algorithm has a key length of ______.




29. In the DES algorithm the round key is __________ bit and the Round Input is ____________bits.




30. In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via____________.




31. The Initial Permutation table/matrix is of size _____.




32. The number of unique substitution boxes in DES after the 48 bit XOR operationare___.




33. What is the number of possible 3 x 3 affine cipher transformations?




34. The S-Box is used to provide confusion, as it is dependent on the unknown key.




35. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88and thus find the CT.




36. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where Ciphermessage=11 and thus find the plain text.




37. In an RSA system the public key of a given user is e = 31, n = 3599. What is the privatekey of this user?




38. Compute private key (d, p, q) given public key (e=23, n=233 ´ 241=56,153).




39. RSA is also a stream cipher like Merkel-Hellman.




40. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?




41. In RSA, Ф(n) = _______ in terms of p and q.




42. For p = 11 and q = 19 and choose e=17. Apply RSA algorithm where message=5 andfind the cipher text.




43. For p = 11 and q = 19 and choose d=17. Apply RSA algorithm where Cipher message=80 and thus find the plain text.




44. Perform encryption on the following PT using RSA and find the CT. p = 3; q = 11; M= 5.




45. Perform encryption on the following PT using RSA and find the CT. p = 5; q = 11; M= 9.




46. Perform encryption on the following PT using RSA and find the CT. p = 7; q = 11; M= 8.




47. Perform encryption on the following PT using RSA and find the CT. p = 11; q = 13;M = 7.




48. n = 35; e = 5; C = 10. What is the plaintext (use RSA)?