Digital Communications Questions and Answers – Pretty Good Privacy

This set of Digital Communications Multiple Choice Questions & Answers (MCQs) focuses on “Pretty good privacy”.

1. Pretty good privacy (PGP) security system uses
a) Public key cryptosystem
b) Private key cryptosystem
c) Public & Private key cryptosystem
d) None of the mentioned
View Answer

Answer: c
Explanation: PGP uses many encryption techniques such as private key cryptosystem and also public key cryptosystem.

2. Public key cryptosystem is used for the encryption of
a) Messages
b) Session key
c) Session key & Messages
d) None of the mentioned
View Answer

Answer: b
Explanation: Public key cryptosystem is used for encryption of messages and private key cryptosystem is used for encryption of messages.

3. For digital signatures private key cryptosystem is used.
a) True
b) False
View Answer

Answer: b
Explanation: Public key cryptosystem is used for the creation of digital signatures.
advertisement
advertisement

4. Data compression includes
a) Removal of redundant character
b) Uniform distribution of characters
c) Removal of redundant character & Uniform distribution of characters
d) None of the mentioned
View Answer

Answer: c
Explanation: Data compression removes redundant character strings in a file and produces a more uniform distribution of characters.

5. PGP offers _____ block ciphers for message encryption.
a) Triple-DES
b) CAST
c) IDEA
d) All of the mentioned
View Answer

Answer: d
Explanation: Pretty good privacy security system offers three block ciphers for message encryption – Triple-DES, IDEA and CAST.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. Which block cipher has key length of 128 bits?
a) IDEA
b) CAST
c) IDEA & CAST
d) None of the mentioned
View Answer

Answer: c
Explanation: The block ciphers IDEA and CAST has key length of 128 bits where as Triple-DES has key size of 168 bits.

7. These three ciphers can operate of ______ of plaintext and cipher text.
a) 128 bit blocks
b) 64 bit blocks
c) 256 bit blocks
d) 156 bit blocks
View Answer

Answer: b
Explanation: The three ciphers – Triple-DES, IDEA and CAST can operate on 64 bit blocks of plain text and cipher text.
advertisement

8. The key size of DES is
a) 56 bits
b) 64 bits
c) 128 bits
d) 168 bits
View Answer

Answer: a
Explanation: The key size of DES algorithm is 56 bits and with Triple-DES, the message to be encrypted is run on DES algorithm 3 times.

9. Which operation is used in encryption using IDEA?
a) Addition modulo 216
b) Bit wise XOR
c) Addition modulo 216 & Bit wise XOR
d) None of the mentioned
View Answer

Answer: c
Explanation: The arithmetic operations used in IDEA are addition modulo 216, multiplication modulo 216+1, and bit wise XOR.
advertisement

10. What is the key size allowed in PGP?
a) 1024-1056
b) 1024-4056
c) 1024-4096
d) 1024-2048
View Answer

Answer: c
Explanation: Pretty good privacy security system allows 1024 to 4096 bits of key size.

11. Which algorithm is used for public key encryption?
a) RSA
b) Diffie-Hellman
c) RSA & Diffie-Hellman
d) None of the mentioned
View Answer

Answer: c
Explanation: The two algorithms used for public key encryption in PGP are RSA and Diffie-Hellman algorithms.

12. Which should be used first to decrypt?
a) Public key
b) Private key
c) Public & Private key
d) None of the mentioned
View Answer

Answer: b
Explanation: The recipient should first decrypt the message using private key and then with the public key.

13. The digital signature provides authentication to the
a) Sender
b) Message
c) Sender & Message
d) None of the mentioned
View Answer

Answer: c
Explanation: The digital signature provides authentication to both the sender and the message.

14. In hash function output length is fixed.
a) True
b) False
View Answer

Answer: a
Explanation: In hash function the output length is fixed and it is easy to compute.

15. The hash function
a) Is collision free
b) Has manageable collision
c) Has high unmanageable level of collision
d) None of the mentioned
View Answer

Answer: a
Explanation: Hash function is collision free and it is unfeasible that two different messages will create the same hash value.

16. DSA protocol is based on
a) Discrete logarithm problem
b) Continuous logarithm problem
c) Discrete & Continuous logarithm problem
d) None of the mentioned
View Answer

Answer: a
Explanation: The DSA algorithm uses and is based on discrete logarithm problem.

Sanfoundry Global Education & Learning Series – Digital Communications.

To practice all areas of Digital Communications, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.