1.DES is based on Fiestel cipher.
Select one:
True {correct}
False
2.Symmetric key does not provide nonrepudiation.
Select one:
True {correct}
False
3.AES is a 128/192/256 key bits cipher.
Select one:
True {correct}
False
4.Key whitening makes the block ciphers such as DES much more resistant against brute-force attacks.
Select one:
True {correct}
False
5.Output Feedback mode a block cipher can be used to build a stream cipher encryption scheme.
Select one:
True{correct}
False
6.Symmetric key provide non-repudiation.
Select one:
True
False {correct}
7.DES is based on on single S-box.
Select one:
True
False{correct}
8.Security level of 3DES is 168 bits.
Select one:
True
False{correct}
9.RSA 1024 bit has 80 bit security level.
Select one:
True{correct}
False
10.Fermat'l Little theroem can be use for finding the inverse of an integer.
Select one:
True{correct}
False
11.In Cipher Block Chaining mode any ciphertext block depends on all previous plaintext blocks.
Select one:
True{correct}
False
12.Cipher Block Chaining mode any ciphertext block does not depends on previous plaintext blocks.
Select one:
True
False{correct}
13.Digital signature only provide Authentication.
/*
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity).
*/
Select one:
True
False{correct}
14.AES is a modern block cipher which supports only 128 bit key length.
Select one:
True
False{correct}
15.In DES avalanche effects comes after 8th round.
Select one:
True
False{correct}
16.Security level of DES is 64 bits.
Select one:
True
False{correct}
17.Electronic Code Book mode is susceptible to substitution attacks.
Select one:
True{correct}
False
18.In DES avalanche effects comes after 5th round.
Select one:
True{correct}
False
19.Each DES S-box has six input bits and four output bits.
Select one:
True{correct}
False
20.In Electronic Code Book mode operations synchronization between the encryption and decryption parties is not necessary.
Select one:
True{correct}
False
21.Fermat'l Little theroem can't find the inverse of an integer.
Select one:
True
False{correct}
22.Security level of DES is 56 bits.
Select one:
True{correct}
False
23.AES is based on Feistel cipher.
Select one:
True
False{correct}
24.Each DES S-box has four input bits and four output bits.
Select one:
True
False{correct}
25.In AES each layer manipulates all 128 bits of the data path.
Select one:
True{correct}
False
Select one:
True {correct}
False
2.Symmetric key does not provide nonrepudiation.
Select one:
True {correct}
False
3.AES is a 128/192/256 key bits cipher.
Select one:
True {correct}
False
4.Key whitening makes the block ciphers such as DES much more resistant against brute-force attacks.
Select one:
True {correct}
False
5.Output Feedback mode a block cipher can be used to build a stream cipher encryption scheme.
Select one:
True{correct}
False
6.Symmetric key provide non-repudiation.
Select one:
True
False {correct}
7.DES is based on on single S-box.
Select one:
True
False{correct}
8.Security level of 3DES is 168 bits.
Select one:
True
False{correct}
9.RSA 1024 bit has 80 bit security level.
Select one:
True{correct}
False
10.Fermat'l Little theroem can be use for finding the inverse of an integer.
Select one:
True{correct}
False
11.In Cipher Block Chaining mode any ciphertext block depends on all previous plaintext blocks.
Select one:
True{correct}
False
12.Cipher Block Chaining mode any ciphertext block does not depends on previous plaintext blocks.
Select one:
True
False{correct}
13.Digital signature only provide Authentication.
/*
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity).
*/
Select one:
True
False{correct}
14.AES is a modern block cipher which supports only 128 bit key length.
Select one:
True
False{correct}
15.In DES avalanche effects comes after 8th round.
Select one:
True
False{correct}
16.Security level of DES is 64 bits.
Select one:
True
False{correct}
17.Electronic Code Book mode is susceptible to substitution attacks.
Select one:
True{correct}
False
18.In DES avalanche effects comes after 5th round.
Select one:
True{correct}
False
19.Each DES S-box has six input bits and four output bits.
Select one:
True{correct}
False
20.In Electronic Code Book mode operations synchronization between the encryption and decryption parties is not necessary.
Select one:
True{correct}
False
21.Fermat'l Little theroem can't find the inverse of an integer.
Select one:
True
False{correct}
22.Security level of DES is 56 bits.
Select one:
True{correct}
False
23.AES is based on Feistel cipher.
Select one:
True
False{correct}
24.Each DES S-box has four input bits and four output bits.
Select one:
True
False{correct}
25.In AES each layer manipulates all 128 bits of the data path.
Select one:
True{correct}
False
Sachin, can you help me in understanding answer for this DES avalanche effects comes after 5th round?
ReplyDeleteAvalanche Effect: The diffusion caused by the expansion, S-
Deleteboxes and the permutation P guarantees that every bit at the
end of the fifth round is a function of every plaintext and key
bit.
Lec-4 slide-22
Thnx bro....
ReplyDelete