Symmetric Ciphers Questions and Answers – Blowfish Algorithm – II

This set of Cryptography Quiz focuses on “Blowfish Algorithm”.

1. In blowfish, the keys are stored in the form of an array ranging from K1, K2 to Ki. What is the value of i?
a) 12
b) 16
c) 8
d) 14
View Answer

Answer: d
Explanation: The keys are stored in an K-array
K_1,K_2,,,,,,,K_J 1≤J≤14.

2. To generate the sub-key P1 to P18 we use the hexadecimal equivalent digits of ____________
a) 0.7864
b) 0.1415
c) 0.1542
d) 0.7535
View Answer

Answer: b
Explanation: To generate the sub-key P1 to P18 we use the hexadecimal equivalent digits of Pi-3 (only the decimal part).

3. P17 gets XORed with
a) K3
b) K12
c) K17
d) K6
View Answer

Answer: a
Explanation: XOR P1 with the key K1, XOR P2 with K2, and so on for all bits of the key (possibly up to P14). Repeatedly cycle through the key bits until the entire P-array has been XORed with key bits.
advertisement
advertisement

4. P15 gets XORed with
a) K3
b) K14
c) K1
d) K6
View Answer

Answer: c
Explanation: XOR P1 with the key K1, XOR P2 with K2, and so on for all bits of the key (possibly up to P14). Repeatedly cycle through the key bits until the entire P-array has been XORed with key bits.

5. What is the number of iterations required in total to generate all the sub-keys in blowfish?
a) 512
b) 521
c) 256
d) 128
View Answer

Answer: b
Explanation: In total, 521 iterations are required to generate all required subkeys(i.e. 9 rounds for P1-P18 and 512 rounds for S1-S4).
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. A single blowfish s-box converts 8-bits to _________ bits.
a) 32
b) 44
c) 56
d) 64
View Answer

Answer: a
Explanation: The blowfish round algorithm –
A single blowfish s-box converts 8-bits to 32 bits

7. The 32bit output of s-box 1 is XORed with s-box 2.
a) True
b) False
View Answer

Answer: a
Explanation: The 32bit output of s-box 1 is added with s-box 2.
advertisement

8. Which of the following statements are true with respect to the blowfish algorithm –
i) Provided key is large enough, brute-force key search is not practical, especially given the high key schedule cost
ii) Key dependent S-boxes and sub keys make analysis very difficult
iii) Changing both halves in each round increases security
iv) Blowfish has improved avalanche effects

a) i) ii) and iv)
b) ii) and iii)
c) i)
d) All are true
View Answer

Answer: d
Explanation: All of the above statements are true with respect to the blowfish algorithm.
advertisement

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Cryptography for quizzes, here is complete set of 1000+ Multiple Choice Questions and Answers

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.