This section contains more frequently asked Cryptography and Network Security Multiple Choice Questions Answers in the various competitive exams.

PRACTICE IT NOW TO SHARPEN YOUR CONCEPT AND KNOWLEDGE

view hide answers

1. The Acronym DES stands for

  • Digital Evaluation System
  • Digital Encryption Standard
  • Digital Encryption System
  • Double Encryption Standard

2. DES works by using

  • permutation and substitution on 64 bit blocks of plain text
  • only permutations on blocks of 128 bits
  • exclusive ORing key bits with 64 bit blocks
  • 4 rounds of substitution on 64 bit blocks with 56 bit keys

3. DES
(i) is a symmetric key encryption method
(ii) guarantees absolute security
(iii) is implementable as hardware VLSI chip
(iv) is a public key encryption method

  • i and ii
  • ii and iii
  • i and iii
  • iii and iv

4. DES using 56 bit keys

  • Cannot be broken in reasonable time using presently available computers
  • Can be broken only if the algorithm is known using even slow computers.
  • Can be broken with presently available high performance computers.
  • It is impossible to break ever.

5. Triple DES uses

  • 168 bit keys on 64-bit blocks of plain text
  • Working on 64-bit blocks of plain text and 56 bit keys by applying DES algorithm for three rounds.
  • Works with 144 bit blocks of plain text and applies DES algorithm once.
  • Uses 128 bit blocks of plain text and 112 bit keys and apply DES algorithm thrice.

6. ripple DES

  • Cannot be broken in reasonable time using presently available computers.
  • Can be broken only if the algorithm is known using even slow computer.
  • Can be broken with presently available high performance computers.
  • It is impossible to break ever.

7. Triple DES

  • is a symmetric key encryption method
  • guarantees excellent security
  • is implementable as a hardware VLSI chip
  • is public key encryption method with three keys.

8. Public key encryption method is a system

  • which uses a set of public keys one for each participant in e-Commerce
  • in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.
  • which uses the RSA coding system.
  • which is a standard for use in e-Commerce.

9. Public key system is useful because

  • it uses two keys.
  • there is no key distribution problem as public key can be kept in a commonly accessible database.
  • private key can be kept secret.
  • it is a symmetric key system.

10. In public key encryption if A wants to send an encrypted message

  • A encrypts message using his private key
  • A encrypts message using B’s private key
  • A encrypts message using B’s public key
  • A encrypts message using his public key
Share with : Share on Linkedin Share on Twitter Share on WhatsApp Share on Facebook