Digital Communications Questions and Answers – Cipher Systems and Secrecy of Cipher Systems

This set of Digital Communications Multiple Choice Questions & Answers (MCQs) focuses on “Cipher Systems and secrecy of cipher systems”.

1. Cryptosystems are used for
a) Privacy
b) Authentication
c) Privacy & Authentication
d) None of the mentioned
View Answer

Answer: c
Explanation: Cryptosystems which includes the process of encryption and decryption is used for both privacy and authentication.

2. The key also contains a
a) Plaintext
b) Ciphertext
c) Plaintext & Ciphertext
d) None of the mentioned
View Answer

Answer: c
Explanation: The key is supplied along with a plaintext message for encryption and cipher text message for decryption.

3. The system which has insufficient information available to crypt-analyst is
a) One-time pad
b) Unconditionally secure
c) One-time pad & Unconditionally secure
d) None of the mentioned
View Answer

Answer: c
Explanation: Unconditionally secure system is the one which has insufficient information available to crypt-analyst. One such system is one-time pad.
advertisement
advertisement

4. Caesar cipher was a mono alphabetic cipher.
a) True
b) False
View Answer

Answer: a
Explanation: An earliest example of a mono alphabetic cipher was the Caesar cipher.

5. In Caesar cipher, each plain text is replaced by
a) Alphabet shift
b) Numerals
c) Symbols
d) None of the mentioned
View Answer

Answer: a
Explanation: In Caesar cipher each plain text is replaced with a new letter obtained by an alphabetic shift.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. The trithemius cipher is a mono alphabetical cipher.
a) True
b) False
View Answer

Answer: b
Explanation: The Trithemius cipher is a poly alphabetical cipher.

7. In auto key method
a) Feedback is necessary
b) Feedback is not necessary
c) Can be either necessary or not
d) None of the mentioned
View Answer

Answer: a
Explanation: In auto key method feedback is necessary for the encryption process.
advertisement

8. In Vigenere method ______ is provided.
a) Priming key
b) Feedback
c) Priming key & Feedback
d) None of the mentioned
View Answer

Answer: c
Explanation: Vigenere method which is also called as vigenere auto method priming key and feedback are used.

9. A cipher system is said to have perfect secrecy if
a) Posteriori probability is equal to priori probability
b) Posteriori probability is greater than priori probability
c) Posteriori probability is less than priori probability
d) None of the mentioned
View Answer

Answer: a
Explanation: A cipher system is said to have perfect secrecy if for every message and cipher text the posteriori probability is equal to priori probability.
advertisement

10. The conditions for perfect secrecy are
a) Only one key transforming message should exist
b) All keys should be equally likely
c) One key transforming message to each cipher text & all keys should be equally likely
d) None of the mentioned
View Answer

Answer: c
Explanation: The conditions for perfect secrecy are, there is only one key transforming message to each cipher text and all keys should be equally likely.

11. The _____ the uncertainty, the ______ is the information content.
a) Lesser, greater
b) Greater, lesser
c) Lesser, lesser
d) Greater, greater
View Answer

Answer: d
Explanation: The more uncertainty there is in predicting the occurrence of a message, the greater the information content.

12. Equivocation is the
a) Joint probability of X and Y
b) Conditional probability of X given Y
c) Conditional probability of Y given X
d) None of the mentioned
View Answer

Answer: b
Explanation: Equivocation is defined as the conditional probability of X given Y.

13. The maximum number of message bits contained in each character is called as
a) True rate
b) Absolute rate
c) Optimum rate
d) None of the mentioned
View Answer

Answer: b
Explanation: Absolute rate is the maximum number of message bits contained in each character.

14. When the key size is finite, equivocation approaches
a) Unity
b) Zero
c) Infinity
d) None of the mentioned
View Answer

Answer: b
Explanation: With a finite key size, equivocation approaches zero.

15. When a system is called as unbreakable?
a) When unique solution is available
b) When unique solution is not available
c) All of the mentioned
d) None of the mentioned
View Answer

Answer: b
Explanation: A system is said to be unbreakable when unique solution is not available because of the number of equations being smaller than the number of unknown key bits.

Sanfoundry Global Education & Learning Series – Digital Communications.

To practice all areas of Digital Communications, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.