Site MapHelpFeedbackMultiple Choice Quiz
Multiple Choice Quiz
(See related pages)

Please answer all questions.

1

________ is the science and art of transforming messages to make them secure and immune to attacks.
A)Cryptography
B)Cryptoanalysis
C)either (a) or (b)
D)neither (a) nor (b)
2

The ________is the original message before transformation.
A)ciphertext
B)plaintext
C)secret-text
D)none of the above
3

The ________ is the message after transformation.
A)ciphertext
B)plaintext
C)secret-text
D)none of the above
4

A(n) _______ algorithm transforms plaintext to ciphertext
A)encryption
B)decryption
C)either (a) or (b)
D)neither (a) nor (b)
5

A(n) ______ algorithm transforms ciphertext to plaintext.
A)encryption
B)decryption
C)either (a) or (b)
D)neither (a) nor (b)
6

A combination of an encryption algorithm and a decryption algorithm is called a ________.
A)cipher
B)secret
C)key
D)none of the above
7

The _______ is a number or a set of numbers on which the cipher operates.
A)cipher
B)secret
C)key
D)none of the above
8

In a(n) ________ cipher, the same key is used by both the sender and receiver.
A)symmetric-key
B)asymmetric-key
C)either (a) or (b)
D)neither (a) nor (b)
9

In a(n) ________, the key is called the secret key.
A)symmetric-key
B)asymmetric-key
C)either (a) or (b)
D)neither (a) nor (b)
10

In a(n) ________ cipher, a pair of keys is used.
A)symmetric-key
B)asymmetric-key
C)either (a) or (b)
D)neither (a) nor (b)
11

In an asymmetric-key cipher, the sender uses the__________ key.
A)private
B)public
C)either (a) or (b)
D)neither (a) nor (b)
12

In an asymmetric-key cipher, the receiver uses the ______ key.
A)private
B)public
C)either (a) or (b)
D)neither (a) nor (b)
13

A ________ cipher replaces one character with another character.
A)substitution
B)transposition
C)either (a) or (b)
D)neither (a) nor (b)
14

_________ ciphers can be categorized into two broad categories: monoalphabetic and polyalphabetic.
A)Substitution
B)Transposition
C)either (a) or (b)
D)neither (a) nor (b)
15

The _______ cipher is the simplest monoalphabetic cipher. It uses modular arithmetic with a modulus of 26.
A)transposition
B)additive
C)shift
D)none of the above
16

The Caesar cipher is a _______cipher that has a key of 3.
A)transposition
B)additive
C)shift
D)none of the above
17

The ________ cipher reorders the plaintext characters to create a ciphertext.
A)substitution
B)transposition
C)either (a) or (b)
D)neither (a) nor (b)
18

A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream.
A)S-box
B)P-box
C)T-box
D)none of the above
19

A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream.
A)S-box
B)P-box
C)T-box
D)none of the above
20

A modern cipher is usually a complex _____cipher made of a combination of different simple ciphers.
A)round
B)circle
C)square
D)none of the above
21

DES is a(n) ________ method adopted by the U.S. government.
A)symmetric-key
B)asymmetric-key
C)either (a) or (b)
D)neither (a) nor (b)
22

DES has an initial and final permutation block and _________ rounds.
A)14
B)15
C)16
D)none of the above
23

The DES function has _______ components.
A)2
B)3
C)4
D)5
24

DES uses a key generator to generate sixteen _______ round keys.
A)32-bit
B)48-bit
C)54-bit
D)42-bit
25

________ DES was designed to increase the size of the DES key
A)Double
B)Triple
C)Quadruple
D)none of the above
26

_______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
A)AEE
B)AED
C)AER
D)AES
27

AES has _____ different configurations
A)two
B)three
C)four
D)five
28

ECB and CBC are ________ ciphers.
A)block
B)stream
C)field
D)none of the above
29

One commonly used public-key cryptography method is the ______ algorithm.
A)RSS
B)RAS
C)RSA
D)RAA
30

The ________ method provides a one-time session key for two parties.
A)Diffie-Hellman
B)RSA
C)DES
D)AES
31

The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
A)man-in-the-middle
B)ciphertext attack
C)plaintext attack
D)none of the above







forouzan4Online Learning Center

Home > Chapter 30 > Multiple Choice Quiz