Cyber Security Questions and Answers – Cryptography – Different Ciphers and their Security Strength

«
»

This set of Cyber Security Puzzles focuses on “Cryptography – Different Ciphers and their Security Strength”.

1. ____________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is replaced by another letter in creating the cipher-text.
a) Polyalphabetic Cipher
b) Caesar Cipher
c) Playfair Cipher
d) Monoalphabetic Cipher
View Answer

Answer: b
Explanation: Caesar Cipher is the simplest type of substitution cipher with a mono-alphabetic encryption code wherein each letter of plain-text is replaced by another letter in creating the cipher-text.
advertisement

2. _____________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.
a) Rolling Cipher
b) Shift Cipher
c) Playfair Cipher
d) Block Cipher
View Answer

Answer: b
Explanation: Shift Cipher is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity (which is the key) between 0 and 25.

3. ________________ is a cipher formed out of substitution where for a given key-value the cipher alphabet for every plain text remains fixed all through the encryption procedure.
a) Polyalphabetic Cipher
b) Caesar Cipher
c) Playfair Cipher
d) Monoalphabetic Cipher
View Answer

Answer: d
Explanation: Monoalphabetic cipher is a cipher formed out of substitution where for a given key-value the cipher alphabet for every plain text remains fixed all through the encryption procedure.

4. In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.
a) Rolling Cipher
b) Shift Cipher
c) Playfair Cipher
d) Block Cipher
View Answer

Answer: c
Explanation: In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext. All the twenty-five alphabets have to be unique and letter J gets omitted.

5. ______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text.
a) Vigenere Cipher
b) Shift Cipher
c) Playfair Cipher
d) Block Cipher
View Answer

Answer: a
Explanation: Vigenere Cipher employs a text string as a key that is implemented to do a series of shifts on the plain-text. Here the sender & the receiver settle on a single key.
advertisement

6. The ________________ has piece of the keyword that has the same length as that of the plaintext.
a) Block Cipher
b) One-time pad
c) Hash functions
d) Vigenere Cipher
View Answer

Answer: b
Explanation: The one-time pad has a piece of the keyword that has the same length as that of the plaintext. The keyword gets a randomly produced string of alphabets. For only once, its keyword is used.

7. In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.
a) Block Cipher
b) One-time pad
c) Hash functions
d) Vigenere Cipher
View Answer

Answer: a
Explanation: In block cipher, a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits. Blocks in these have fixed number of bits.

8. In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.
a) Block Cipher
b) One-time pad
c) Stream cipher
d) Vigenere Cipher
View Answer

Answer: c
Explanation: In stream ciphers, the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.

9. The procedure to add bits to the last block is termed as _________________
a) decryption
b) hashing
c) tuning
d) padding
View Answer

Answer: d
Explanation: For a block cipher, a chain of actions is performed on this block after a block of plain-text. In block ciphers procedure to add bits to the last block is termed as padding.
advertisement

10. Which of the following is not an example of a block cipher?
a) DES
b) IDEA
c) Caesar cipher
d) Twofish
View Answer

Answer: c
Explanation: In a block cipher, a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits. Examples of block ciphers are DES, IDEA, Twofish etc.

11. Data Encryption Standard is implemented using the Feistel Cipher which employs 16 round of Feistel structure.
a) DES
b) IDEA
c) Caesar cipher
d) Twofish
View Answer

Answer: a
Explanation: Data Encryption Standard is a block cipher which implements the Feistel Cipher which employs 16 round of Feistel structure. The block size it uses is 64-bit.

12. DES stands for ________________
a) Data Encryption Security
b) Data Encrypted Standard
c) Device Encryption Standard
d) Data Encryption Standard
View Answer

Answer: d
Explanation: DES which is abbreviated as Data Encryption Standard falls under the category of a block cipher that implements the Feistel Cipher which employs 16 round of Feistel structure.

13. ____________ carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.
a) AES
b) DES
c) IDEA
d) Twofish
View Answer

Answer: a
Explanation: Advanced Encryption Standard is a comparatively innovative block cipher that carries out all its calculations on bytes rather than using bits and is at least 6-times faster than 3-DES.
advertisement

14. AES stands for ________________
a) Advanced Encryption Security
b) Advanced Encryption Standard
c) Advanced Encrypted Standard
d) Active Encryption Standard
View Answer

Answer: b
Explanation: AES is abbreviated as Advanced Encryption Standard which is a moderately innovative block cipher which carries out all its calculations on bytes rather than using bits and is at least six times faster than 3-DES.

15. AES is at least 6-times faster than 3-DES.
a) True
b) False
View Answer

Answer: a
Explanation: AES is a relatively innovative type of block cipher on bytes rather than using bits. It is one of the most popular forms of a block cipher and helps in securing various applications and systems.

Sanfoundry Global Education & Learning Series – Cyber Security.

To practice all Puzzles on Cyber Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

advertisement
advertisement
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn