This set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “The AES Algorithm”.
1. AES uses a ____________ bit block size and a key size of __________ bits.
a) 128; 128 or 256
b) 64; 128 or 192
c) 256; 128, 192, or 256
d) 128; 128, 192, or 256
View Answer
Explanation: It uses a 128-bit block size and a key size of 128, 192, or 256 bits.
2. Like DES, AES also uses Feistel Structure.
a) True
b) False
View Answer
Explanation: AES does not use a Feistel structure. Instead, each full round consists of four separate functions:
-byte substitution
-Permutation
-arithmetic operations over a finite field, and
-XOR with a key.
3. Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?
a) JUPITER
b) Blowfish
c) Serpent
d) Rijndael
View Answer
Explanation: JUPITER is not a cryptographic algorithm.
4. Which algorithm among – MARS, Blowfish, RC6, Rijndael and Serpent – was chosen as the AES algorithm?
a) MARS
b) Blowfish
c) RC6
d) Rijndael
View Answer
Explanation: In October 2000 the Rijndael algorithm was selected as the winner and NIIST officially announced that Rijndael has been chosen as Advanced Encryption Standard (AES) in November 2001.
5. How many rounds does the AES-192 perform?
a) 10
b) 12
c) 14
d) 16
View Answer
Explanation: AES 192 performs 12 rounds.
6. How many rounds does the AES-256 perform?
a) 10
b) 12
c) 14
d) 16
View Answer
Explanation: AES 256 performs 14 rounds.
7. What is the expanded key size of AES-192?
a) 44 words
b) 60 words
c) 52 words
d) 36 words
View Answer
Explanation: AES-192 has an expanded key size of 52 words.
8. The 4×4 byte matrices in the AES algorithm are called
a) States
b) Words
c) Transitions
d) Permutations
View Answer
Explanation: The matrices are called states.
9. In AES the 4×4 bytes matrix key is transformed into a keys of size __________
a) 32 words
b) 64 words
c) 54 words
d) 44 words
View Answer
Explanation: In AES the 4×4 bytes matrix key is transformed into a keys of size 44 bytes.
10. For the AES-128 algorithm there are __________ similar rounds and _________ round is different.
a) 2 pair of 5 similar rounds ; every alternate
b) 9 ; the last
c) 8 ; the first and last
d) 10 ; no
View Answer
Explanation: In the AES-128 there are 9 similar rounds and the last round is different.
11. Which of the 4 operations are false for each round in the AES algorithm
i) Substitute Bytes
ii) Shift Columns
iii) Mix Rows
iv) XOR Round Key
a) i) only
b) ii) iii) and iv)
c) ii) and iii)
d) only iv)
View Answer
Explanation: AES rounds involve substitute bytes, shift rows, mix columns and addition of round key.
12. There is an addition of round key before the start of the AES round algorithms.
a) True
b) False
View Answer
Explanation: In AES the final round contains only three transformations, and there is an initial single transformation (Add Round Key) before the first round which can be considered Round 0. Each transformation takes 4×4 matrixes as input and produces a 4×4 matrix as output.
Sanfoundry Global Education & Learning Series – Cryptography and Network Security.
To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.
- Check Cryptography and Network Security Books
- Practice Cyber Security MCQ
- Practice Computer Science MCQs
- Apply for Computer Science Internship
- Check Computer Science Books