This set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “The AES Algorithm”.
1. AES uses a ____________ bit block size and a key size of __________ bits.
a) 128; 128 or 256
b) 64; 128 or 192
c) 256; 128, 192, or 256
d) 128; 128, 192, or 256
Explanation: It uses a 128-bit block size and a key size of 128, 192, or 256 bits.
2. Like DES, AES also uses Feistel Structure.
Explanation: AES does not use a Feistel structure. Instead, each full round consists of four separate functions:
-arithmetic operations over a finite field, and
-XOR with a key.
3. Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?
Explanation: JUPITER is not a cryptographic algorithm.
4. Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm?
Explanation: In October 2000 the Rijndael algorithm was selected as the winner and NIIST officially announced that Rijndael has been chosen as Advanced Encryption Standard (AES) in November 2001.
5. How many rounds does the AES-192 perform?
Explanation: AES 192 performs 12 rounds.
6. How many rounds does the AES-256 perform?
Explanation: AES 256 performs 14 rounds.
7. What is the expanded key size of AES-192?
a) 44 words
b) 60 words
c) 52 words
d) 36 words
Explanation: AES-192 has an expanded key size of 52 words.
8. The 4×4 byte matrices in the AES algorithm are called
Explanation: The matrices are called states.
9. In AES the 4×4 bytes matrix key is transformed into a keys of size __________
a) 32 words
b) 64 words
c) 54 words
d) 44 words
Explanation: In AES the 4×4 bytes matrix key is transformed into a keys of size 44 bytes.
10. For the AES-128 algorithm there are __________ similar rounds and _________ round is different.
a) 2 pair of 5 similar rounds ; every alternate
b) 9 ; the last
c) 8 ; the first and last
d) 10 ; no
Explanation: In the AES-128 there are 9 similar rounds and the last round is different.
11. Which of the 4 operations are false for each round in the AES algorithm
i) Substitute Bytes
ii) Shift Columns
iii) Mix Rows
iv) XOR Round Key
a) i) only
b) ii) iii) and iv)
c) ii) and iii)
d) only iv)
Explanation: AES rounds involve substitute bytes, shift rows, mix columns and addition of round key.
12. There is an addition of round key before the start of the AES round algorithms.
Explanation: In AES the final round contains only three transformations, and there is an initial single transformation (Add Round Key) before the first round which can be considered Round 0. Each transformation takes 4×4 matrixes as input and produces a 4×4 matrix as output.
Sanfoundry Global Education & Learning Series – Cryptography and Network Security.
To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.