Question: uestion 1 Block cipher uses confusion and diffusion at the same time True False 1 points Question 2 In stream cipher, encryption proceeds blocks by
uestion 1
Block cipher uses confusion and diffusion at the same time
True
False
1 points
Question 2
In stream cipher, encryption proceeds blocks by blocks of several bytes at a time.
True
False
Question 3
In substitution cipher, only brute force attacks can be performed
True
False
Question 4
The key compression block removes the parity bits from the 64 bit key
True
False
Question 5
In public key cryptography, the algorithm proceeds with two keys
True
False
Question 6
Consider the bits 1 0 0 1 0 1. After passing through S1, the output will be:
|
| 4 | |
|
| 13 | |
|
| 9 | |
|
| 3 |
Question 7
After IP in DES, the block is compressed to 56 bits
True
False
Question 8
Even using quantum computing, computationally secure algorithms cant be broken
True
False
Question 9
The study of principles/ methods of deciphering ciphertext without knowing key is called
|
| Cryptography | |
|
| Cryptoanalysis | |
|
| Cryptology | |
|
| Traffic engineering |
Question 10
Consider the following bytes: 0 1 0 1 0 1 1 1 0 0 1 0 1 0 1 Assuming it is round 3 of DES key generation. The key after this round will be:
|
| 1 0 1 0 1 0 1 1 1 0 0 1 0 1 0 1 | |
|
| 1 0 1 0 1 0 1 1 1 0 0 1 0 1 0 0 | |
|
| 0 1 0 1 0 1 1 1 0 0 1 0 1 0 1 1 | |
|
| 1 0 1 0 1 1 1 0 0 1 0 1 0 1 1 0 |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
