This document contains 10 multiple choice questions about cryptography. It covers topics like the definition of a cipher, who keeps the private key in asymmetric key cryptography, examples of asymmetric key algorithms like RSA and Diffie-Hellman, how transpositional ciphers rearrange letters in a message, what data encryption standard (DES) is, what cryptanalysis is used for, which cryptographic protocol secures HTTP connections, what cipher provides voice privacy in GSM cellular protocols, whether ElGamal is a symmetric or asymmetric algorithm, and that cryptographic hash functions return a fixed size bit string.
This document contains 10 multiple choice questions about cryptography. It covers topics like the definition of a cipher, who keeps the private key in asymmetric key cryptography, examples of asymmetric key algorithms like RSA and Diffie-Hellman, how transpositional ciphers rearrange letters in a message, what data encryption standard (DES) is, what cryptanalysis is used for, which cryptographic protocol secures HTTP connections, what cipher provides voice privacy in GSM cellular protocols, whether ElGamal is a symmetric or asymmetric algorithm, and that cryptographic hash functions return a fixed size bit string.
This document contains 10 multiple choice questions about cryptography. It covers topics like the definition of a cipher, who keeps the private key in asymmetric key cryptography, examples of asymmetric key algorithms like RSA and Diffie-Hellman, how transpositional ciphers rearrange letters in a message, what data encryption standard (DES) is, what cryptanalysis is used for, which cryptographic protocol secures HTTP connections, what cipher provides voice privacy in GSM cellular protocols, whether ElGamal is a symmetric or asymmetric algorithm, and that cryptographic hash functions return a fixed size bit string.
This document contains 10 multiple choice questions about cryptography. It covers topics like the definition of a cipher, who keeps the private key in asymmetric key cryptography, examples of asymmetric key algorithms like RSA and Diffie-Hellman, how transpositional ciphers rearrange letters in a message, what data encryption standard (DES) is, what cryptanalysis is used for, which cryptographic protocol secures HTTP connections, what cipher provides voice privacy in GSM cellular protocols, whether ElGamal is a symmetric or asymmetric algorithm, and that cryptographic hash functions return a fixed size bit string.
a) algorithm for performing encryption and decryption b) encrypted message c) both (a) and (b) d) none of the mentioned Answer:a 2. In asymmetric key cryptography, the private key is kept by a) sender b) receiver c) sender and receiver d) all the connected devices to the network Answer:b 3. Which one of the following algorithm is not used in asymmetric-key cryptography? a) RSA algorithm b) diffie-hellman algorithm c) electronic code book algorithm d) none of the mentioned Answer:c 4. In cryptography, the order of the letters in a message is rearranged by a) transpositional ciphers b) substitution ciphers c) both (a) and (b) d) none of the mentioned Answer:a 5. What is data encryption standard (DES)? a) block cipher b) stream cipher c) bit cipher d) none of the mentioned Answer:a 6. Cryptanalysis is used a) to find some insecurity in a cryptographic scheme b) to increase the speed c) to encrypt the data d) none of the mentioned Answer:a 7. Which one of the following is a cryptographic protocol used to secure HTTP connection? a) stream control transmission protocol (SCTP) b) transport layer security (TSL) c) explicit congestion notification (ECN) d) resource reservation protocol Answer:b Computer Networks Questions & Answers Cryptography
8. Voice privacy in GSM cellular telephone protocol is provided by
a) A5/2 cipher b) b5/4 cipher c) b5/6 cipher d) b5/8 cipher Answer:a 9. ElGamal encryption system is a) symmetric key encryption algorithm b) asymmetric key encryption algorithm c) not an encryption algorithm d) none of the mentioned Answer:b 10. Cryptographic hash function takes an arbitrary block of data and returns a) fixed size bit string b) variable size bit string c) both (a) and (b) d) none of the mentioned Answer:a