Home »
Cryptography »
Cryptography MCQs
MCQ | Cryptography Basics
Here, we have a set of multiple-choice questions and answers (quiz) on cryptography basics (basic concepts of cryptography techniques).
Submitted by Monika Sharma, on February 02, 2020
Cryptography Basics MCQs
1) Which of the following is not a type of symmetric-key cryptography technique?
- Caesar cipher
- Data Encryption Standard (DES)
- Diffie Hellman cipher
- Playfair cipher
Answer: c) Diffie Hellman cipher
Explanation:
The Diffie Hellman uses a pair of asymmetric keys for encryption and decryption processes. All the rest mentioned cipher techniques use the same key for encryption as well as decryption.
2) Which of the following is not a principle of data security?
- Data Confidentiality
- Data Integrity
- Authentication
- None of the above
Answer: d) None of the above
Explanation:
All the first three options are the principles of data security. None of the mentioned characteristics fall apart form these principles. Therefore, the correct answer is none of the above.
3) Which of the following security attacks is not an active attack?
OR
Which of the following attacks is a passive attack?
- Masquerade
- Modification of message
- Denial of service
- Traffic analysis
Answer: d) Traffic analysis
Explanation:
In a passive attack, the attacker does not modify any part of the data. His attempt is only to obtain the information and not to modify it. From the mentioned options, this happens only in Traffic analysis in which the attacker monitors the pattern of transmission. The rest other options are examples of active attacks.
4) Which of the following options correctly defines the Brute force attack?
- Brutally forcing the user to share the useful information like pins and passwords.
- Trying every possible key to decrypt the message.
- One entity pretends to be some other entity
- The message or information is modified before sending it to the receiver.
Answer: b) Trying every possible key to decrypt the message.
Explanation:
Only option b) is the correct definition for brute force attack.
5) "A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?
- An integer values
- A square matrix
- An array of characters (i.e. a string)
- All of the above
Answer: d) All of the above
Explanation:
As the key can be any string of bits, all the mentioned options are capable of becoming a key in a cryptographic algorithm.
6) A mechanism used to encrypt and decrypt data.
- Cryptography
- Algorithm
- Data flow
- None of these
Answer: a) Cryptography
Explanation:
Cryptography is a mechanism used to encrypt and decrypt data.
7) To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
- Word, number, or phrase
- Special Symbols
- Function Keys
- All of these
Answer: a) word, number and phrase
Explanation:
Word, number and phrase are used to encrypt the plaintext.
8) The plaintext encrypts to different cipher text with different keys
- True
- False
Answer: a) True
Explanation:
The plaintext is used to encrypt to different cipher text with different keys.
9) Conventional cryptography also known as ... encryption.
- asymmetric-key
- logical-key
- symmetric-key
- None of these
Answer: c) symmetric-key
Explanation:
Conventional cryptography also known as symmetric-key encryption.
10) The Data Encryption Standard (DES) is an example of a ...
- Conventional cryptosystem
- Asymmetric cryptosystem
- Caesar's cryptosystem
- All of these
Answer: a) Conventional cryptosystem
11) Public key cryptography is a ... cryptosystem
- Symmetric
- Asymmetric
- Symmetric & Asymmetric both
- None of these
Answer: b) Asymmetric cryptosystem
Explanation:
Asymmetric is a public key cryptography.
12) Security Goals of Cryptography are
- Confidentiality
- Authenticityn
- Data integrityn
- Non-repudiation
- All of these
Answer: e) All of these
Explanation:
Confidentiality, authenticity, data integrity and non-repudiation security are the key goals of cryptography.
13) A process of studying cryptographic system is known as Cryptanalysis
- True
- False
Answer: a) True
Explanation:
Cryptanalysis is a process of studying cryptographic system.
14) Cipher in cryptography is –
- Encrypted message
- Algorithm for performing encryption and decryption
- Both algorithm for performing encryption and decryption and encrypted message
- Decrypted message
Answer: b) algorithm for performing encryption and decryption
Explanation:
Cipher in cryptography is an Algorithm for performing encryption and decryption.
15) The private key in asymmetric key cryptography is kept by
- Sender
- Receiver
- Sender and receiver
- All the connected devices to the network
Answer: b) Receiver
Explanation:
The private key is kept by the receiver.
16) Which one of the following algorithms is not used in asymmetric-key cryptography?
- DSA algorithm
- Electronic code book algorithm
- Diffie-Hellman algorithm
- RSA algorithm
Answer: b) Electronic code book algorithm
Explanation:
The electronic code book algorithm is a block cypher method in which a block of data corresponds to each block of text in the encrypted message.
17) Which is the cryptographic protocol that is used to protect an HTTP connection?
- Resource reservation protocol
- SCTP
- TLS
- ECN
Answer: c) TLS (Transport Layer Security)
Explanation:
In order to prevent eavesdropping, tampering and message forgery, TLS has strong message authentication and key-material generation.
18) A key is a value that works with a cryptographic algorithm to produce a specific cipher text.
- True
- False
Answer: a) True
Explanation:
A key is a value that works with a cryptographic algorithm to produce a specific cipher text.
19) A Public key size and conventional cryptography’s secret key size are closely related with one another.
- True
- False
Answer: b) False
Explanation:
A Public key size and conventional cryptography’s secret key size are unrelated with one another.
20) ElGamal encryption system is an asymmetric key encryption algorithm.
- Public-key cryptography
- Private-key cryptography
- Both
- None of these
Answer: a) Public-key cryptography
Explanation:
The ElGamal encryption scheme in cryptography is an asymmetrical key encryption algorithm based on the Diffie-Hellman key exchange for public-key cryptography.
More...