Cryptography Questions and Answers – Symmetric Key Distribution – II

This set of Cryptography Aptitude Test focuses on “Symmetric Key Distribution”.

1. Larger networks would prefer a full decentralization.
a) True
b) False
View Answer

Answer: b
Explanation: Full decentralization is not practical for larger networks as there would be too many connections.

2. Which of these is not a type of session key?
a) PIN-encrypting key
b) File-encrypting key
c) Session encrypting key
d) Data encrypting key
View Answer

Answer: c
Explanation: Data, PIN and File are the different session keys.

3. Which session key is used for electronic funds transfer and point of sale applications?
a) Data-encrypting key
b) File-encrypting key
c) PIN-encrypting key
d) None of the mentioned
View Answer

Answer: c
Explanation: PIN-encrypting key is the session key which is used for electronic funds transfer and point of sale applications.
advertisement
advertisement

4. Sometimes a simple tag is introduced along with the session key. This tag has 8 bits. Which of the following options is wrong?
a) One bit indicates whether the key is a session key or a master key
b) One bit indicates whether the key can be used for encryption
c) Three bit indicates whether the key can be used for decryption
d) Remaining bits are for future use
View Answer

Answer: c
Explanation: One bit indicates whether the key can be used for decryption.

5. Hash Value = H = h(CV)
Key Input = Km XOR H
Ciphertext = E([Km XOR H],Ks)
What is CV here?
a) Cipher vector
b) Current vector
c) Control vector
d) None of the mentioned
View Answer

Answer: c
Explanation: CV is known as Control Vector.

6. Which is the correct representation for session key recovery for the plain text?
a) D ([Km XOR H], E([Km XOR H], Ks)
b) D([Km XOR H],Ks)
c) D ([Km XOR H], E([Km XOR H])
d) None of the mentioned
View Answer

Answer: a
Explanation: The correct representation is D([Km XOR H], E([Km XOR H], Ks), to recover the session key.

7. Which of the following is required to find the session key?
i) Control Vector
ii) Master Key
iii) Encrypted session Key

advertisement

a) i)
b) i) and ii)
c) i) and iii)
d) i) ii) and iii)
View Answer

Answer: d
Explanation: We require all three to find the session key.

8. “Meet in the middle attack” and “man in the middle attack” are the same.
a) True
b) False
View Answer

Answer: b
Explanation: Man is the middle attack is different from meet in the middle attack.
advertisement

9. “Meet in the middle attack” is an attack
a) where the timing required for the attack via brute force is drastically reduced
b) where the adversary uses 2 or more machines to decrypt thus trying to reduce the time
c) where messages are intercepted and then either relayed or substituted with another message
d) where cryptanalysis takes lesser time than the brute force decryption
View Answer

Answer: c
Explanation: “Meet in the middle attack” is an attack where messages are intercepted and then either relayed or substituted with another message.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Cryptography for aptitude tests, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.