Polybius Square Multiple Choice Questions and Answers (MCQs)

This set of Data Structures & Algorithms Multiple Choice Questions & Answers (MCQs) focuses on “Polybius Square”.

1. Polybius square is also known by the name of?
a) Polybius checkboard
b) Polybius table
c) Ploybius board
d) Ploybius keypad
View Answer

Answer: a
Explanation: Polybius square is similar to substitution cipher. It is also known by the name of Polybius checkboard.

2. How many keys are required for encryption and decryption of data when we use asymmetric cipher?
a) 0
b) 1
c) 2
d) 3
View Answer

Answer: c
Explanation: Asymmetric cipher makes use of 2 keys for the purpose of encryption. One is known as public key whereas other is called private key.

3. Which of the following is made possible by the use of Polybius square?
a) To represent the plain text by smaller set of symbols
b) To represent the plain text by larger set of symbols
c) To represent the plain text by the letters of some other language
d) To represent the plain text by the same set of symbols
View Answer

Answer: a
Explanation: Polybius square is similar to substitution cipher. Polybius square allows us to cipher the plain text in such a way that a minimum number of symbols are used in the encrypted text.
advertisement
advertisement

4. What is the usual size of polybius square used for encrypting English alphabets?
a) 5 X 5
b) 6 X 6
c) 26 X 26
d) 25 X 25
View Answer

Answer: a
Explanation: The usual size of poybius square for encrypting English alphabets is 5 X 5. Usually, I and J are combined so as to fit all English letters in this table.

5. Polybius square cipher is most closely related to?
a) mono-alphabetic cipher
b) poly-alphabetic cipher
c) transposition cipher
d) additive cipher
View Answer

Answer: a
Explanation: Polybius square cipher is much like any mono alphabetic cipher. It is because it applies a fixed substitution to the letters present in plain text.

6. Which two English letters are usually combined in polybius table?
a) A and B
b) Y and Z
c) I and J
d) J and K
View Answer

Answer: c
Explanation: The usual size of poybius square for encrypting English alphabets is 5 X 5. Usually, I and J are combined so as to fit all English letters in this table.

7. Auto key cipher is more secure than polybius square cipher?
a) true
b) false
View Answer

Answer: a
Explanation: Polybius square is closely related to mono alphabetic substitution cipher and thus is more vulnerable to frequency analysis. Whereas polybius square being a poly alphabetic cipher is less vulnerable to frequency analysis and so is more secure.
advertisement

8. Polybius square cipher is less susceptible to frequency analysis.
a) true
b) false
View Answer

Answer: b
Explanation: Polybius square cipher is closely related to mono alphabetic cipher. Thus it is quite vulnerable to frequency analysis much like any other mono alphabetic cipher.

9. Which of the following cipher uses polybius square cipher in its first step of encrypting data?
a) Autokey cipher
b) One time pad cipher
c) ADFGVX cipher
d) Rail fence cipher
View Answer

Answer: c
Explanation: ADFGVX cipher uses polybius square cipher in its first step of encrypting data. It uses a 6 X 6 version of polybius square.
advertisement

10. What will be the plain text corresponding to ciphered text “134325” if standard polybius square cipher is used for encryption?
a) SRH
b) CSK
c) RCB
d) KKR
View Answer

Answer: b
Explanation: For decoding ciphered text we have to use the polybius square in and find out the letters corresponding to each pair of coordinate. So in this case the plain text is found to be “CSK”.

11. What will be the encrypted text corresponding to plain text “SAN” using standard polybius square cipher?
a) 431133
b) 341133
c) 441133
d) 114433
View Answer

Answer: a
Explanation: For encrypting using polybius square cipher we have to use the table which is shown below and write (row, col) coordinates corresponding to each letter.
1 2 3 4 5
1 A B C D E
2 F G H I/J K
3 L M N O P
4 Q R S T U
5 V W X Y Z
So the ciphered text will be “431133”.

12.What will be the output of the following C++ code?

#include <cmath> 
#include <iostream> 
using namespace std; 
void Cipher(string str) 
{ 
    int r, c; 
    for (int i = 0; str[i]; i++) 
    { 
 
	r = ceil((str[i] - 'a') / 5) + 1; 
 
 
	c = ((str[i] - 'a') % 5) + 1; 
 
 
	if (str[i] == 'k') 
        { 
	    r = r - 1; 
	    c = 5 - c + 1; 
	} 
 
 
	else if (str[i] >= 'j') 
        { 
	    if (c == 1) 
            { 
		c = 6; 
		r = r - 1; 
	    } 
	    c = c - 1; 
	} 
	cout << r << c; 
    } 
    cout << endl; 
} 
 
int main() 
{ 
    string str = "nsit"; 
    Cipher(str); 
}

a) 33344244
b) 44332434
c) 33432444
d) 11444323
View Answer

Answer: c
Explanation: The given code implements polybius square cipher on a given plain text. So here as the plain text is “nsit” so the output of the code should be “33432444”.

Sanfoundry Global Education & Learning Series – Data Structures & Algorithms.

To practice all areas of Data Structures & Algorithms, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.