Cryptography

Q1. This is an encryption/decryption key known only to the party or parties that exchange secret messages.

  1.  e-signature
  2.  digital certificate
  3.  private key
  4.  security token
Show Answer

Answer: 3. private key

 

Q2. Cryptographic hash function takes an arbitrary block of data and returns

  1.  fixed size bit string
  2.  variable size bit string
  3.  both (1) and (2)
  4.  none of the mentioned
Show Answer

Answer: 1. fixed size bit string

 

Q3. The inverse of 37 mod 49 is

  1.  23
  2.  12
  3.  4
  4.  6
Show Answer

Answer: 3.  4

Explanation: 37-1 mod 49 = 4
Step 1. Calculate A * B mod C for B values 0 through C-1
Step 2. The modular inverse of A mod C is the B value that makes A * B mod C = 1

 

Q4. This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa.

  1. footprinting
  2. hash function
  3. watermark
  4. Electronic Code Book
Show Answer

Answer: 4. Electronic Code Book

 

Q5. How many primitive roots are there for 19?

  1.  4
  2.  5
  3.  3
  4.  6
Show Answer

Answer: 4.  6

Explanation: 2, 3, 10, 13, 14, 15 are the primitive roots of 19.
Let p be a prime. Then b is a primitive root for p if the powers of b,
1, b, b^2, b^3, ...
include all of the residue classes mod p (except 0).

 

Q6. Voice privacy in GSM cellular telephone protocol is provided by

  1.  A5/2 cipher
  2.  b5/4 cipher
  3.  b5/6 cipher
  4.  b5/8 cipher
Show Answer

Answer: 1. A5/2 cipher

 

Q7. In cryptography, the order of the letters in a message is rearranged by

  1. transpositional ciphers
  2. substitution ciphers
  3. both (1) and (2)
  4. none of the mentioned
Show Answer

Answer: 1. transpositional ciphers

 

Q8. What is data encryption standard (DES)?

  1. block cipher
  2. stream cipher
  3. bit cipher
  4. none of the mentioned
Show Answer

Answer: 1. block cipher

 

Q9. The cryptography algorithms used in S/MIME are _________.

  1. IDEA.
  2. RC4.
  3. RSA,DES-3.
  4. RC5.
Show Answer

Answer: 3.RSA,DES-3

 

Q10. In asymmetric key cryptography, the private key is kept by

  1. sender
  2. receiver
  3. sender and receiver
  4. all the connected devices to the network
Show Answer

Answer: 2. receiver

 

Subscribe us to receive more such articles updates in your email.

If you have any questions, feel free to ask in the comments section below. Nothing gives me greater joy than helping my readers!

Disclaimer: This tutorial is for educational purpose only. Individual is solely responsible for any illegal act.

You may also like...

3 Responses

  1. John says:

    You have made your point very nicely!!

  2. Michael says:

    This is nicely said!.

  3. Michael says:

    Kudos! An abundance of content!

Leave a Reply to John Cancel reply

Your email address will not be published. Required fields are marked *

10 Blockchain Security Vulnerabilities OWASP API Top 10 - 2023 7 Facts You Should Know About WormGPT OWASP Top 10 for Large Language Models (LLMs) Applications Top 10 Blockchain Security Issues