Sunday, March 8, 2015

Network Security Quiz 2

1.DES is based on Fiestel cipher.

Select one:
True {correct}
False

2.Symmetric key does not provide nonrepudiation.

Select one:
True {correct}
False

3.AES is a 128/192/256 key bits cipher.

Select one:
True {correct}
False

4.Key whitening makes the block ciphers such as DES much more resistant against brute-force attacks.

Select one:
True {correct}
False

5.Output Feedback  mode a block cipher can be used to build a stream cipher encryption scheme.

Select one:
True{correct}
False

6.Symmetric key provide non-repudiation.

Select one:
True
False {correct}

7.DES is based on on single S-box. 

Select one:
True
False{correct}

8.Security level of 3DES  is 168 bits.

Select one:
True
False{correct}

9.RSA 1024 bit has 80 bit security level.

Select one:
True{correct}
False

10.Fermat'l Little theroem can be use for finding the inverse of an integer.

Select one:
True{correct}
False

11.In  Cipher Block Chaining mode any ciphertext block depends on all previous plaintext blocks.

Select one:
True{correct}
False

12.Cipher Block Chaining mode any ciphertext block does not depends on previous plaintext blocks.

Select one:
True
False{correct}

13.Digital signature only provide Authentication.
/*
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity).
*/
Select one:
True
False{correct}

14.AES is a modern block cipher which supports only 128 bit key length.

Select one:
True
False{correct}

15.In DES avalanche effects comes after 8th round.

Select one:
True
False{correct}

16.Security level of DES  is 64 bits.

Select one:
True
False{correct}

17.Electronic Code Book  mode is susceptible to substitution attacks.

Select one:
True{correct}
False

18.In DES avalanche effects comes after 5th round.

Select one:
True{correct}
False

19.Each DES S-box has six input bits and four output bits.

Select one:
True{correct}
False

20.In Electronic Code Book mode operations synchronization between the encryption and decryption parties is not necessary.

Select one:
True{correct}
False

21.Fermat'l Little theroem can't find the inverse of an integer.

Select one:
True
False{correct}

22.Security level of DES  is 56 bits.

Select one:
True{correct}
False

23.AES is based on Feistel cipher.

Select one:
True
False{correct}


24.Each DES S-box has four input bits and four output bits.

Select one:
True
False{correct}

25.In AES each layer manipulates all 128 bits of the data path.

Select one:
True{correct}
False

3 comments:

  1. Sachin, can you help me in understanding answer for this DES avalanche effects comes after 5th round?

    ReplyDelete
    Replies
    1. Avalanche Effect: The diffusion caused by the expansion, S-
      boxes and the permutation P guarantees that every bit at the
      end of the fifth round is a function of every plaintext and key
      bit.
      Lec-4 slide-22

      Delete