This document is a class test on cryptography and network security from Ghanashyam Hemalata Institute of Technology & Management, Puri. It contains two sections - the first with 5 fill-in-the-blank questions covering topics like Caesar cipher and cryptanalysis of the Zimmermann Telegram. The second section has 10 multiple choice questions testing knowledge of concepts like AES encryption, cryptographic algorithms, CRT, symmetric key cryptography, transposition ciphers and bit-level encryption. The test has a maximum mark of 25 and duration of 1 hour.
This document is a class test on cryptography and network security from Ghanashyam Hemalata Institute of Technology & Management, Puri. It contains two sections - the first with 5 fill-in-the-blank questions covering topics like Caesar cipher and cryptanalysis of the Zimmermann Telegram. The second section has 10 multiple choice questions testing knowledge of concepts like AES encryption, cryptographic algorithms, CRT, symmetric key cryptography, transposition ciphers and bit-level encryption. The test has a maximum mark of 25 and duration of 1 hour.
This document is a class test on cryptography and network security from Ghanashyam Hemalata Institute of Technology & Management, Puri. It contains two sections - the first with 5 fill-in-the-blank questions covering topics like Caesar cipher and cryptanalysis of the Zimmermann Telegram. The second section has 10 multiple choice questions testing knowledge of concepts like AES encryption, cryptographic algorithms, CRT, symmetric key cryptography, transposition ciphers and bit-level encryption. The test has a maximum mark of 25 and duration of 1 hour.
GHANASHYAM HEMALATA INSTITUTE OF TECHNOLOGY & MANAGEMENT, PURI
CLASS TEST – II (2018-19)
CRYPTOGRAPHY & NETWORK Subject Subject Code Max. Marks 25 SECURITY Branch Computer Science & Engineering Semester 7th Semester Time 01 hr. Name Roll no/ Regd no
Marks Secured: .........................
In Words: Signature Of Invigilator(S) Signature of Examiner
All Questions are compulsory Right hand side figures indicate marks 1. Fill in the blanks (1X5) i) In_______________ cipher, the message is encrypted by substituting the letter of the alphabet n places ahead of the current letter. ii) The _________________ telegram is one of the first examples from the last century of the role that cryptanalysis has had in political and military affairs iii) TEA uses a 64-bit block length and a ______bit key. iv) A ______MAC is a standard approach to provide data integrity. v) A stream cipher takes a key K of n bits in length and stretches it into a long ___________. 2. Multiple answer type (Write down the correct answer) (2X10) i) AES uses a ____________ bit block size and a key size of __________ bits. a) 128; 128 or 256 b) 64; 128 or 192 c) 256; 128, 192, or 256 d) 128; 128, 192, or 256 ii) Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent? a) JUPITER b) Blowfish c) Serpent d) Rijndael iii) How many rounds does the AES-256 perform? a) 10 b) 12 c) 14 d) 16 iv) Find x for the CRT when x= 2 mod 3; x= 3 mod 5; x = 2 mod 7 a) 33 b) 22 c) 23 d) 31 2 v) 17 x = 10 ( mod 29 ) a) x = 3, 22 (mod 29) b) x = 7, 28 (mod 29) c) x = 2, 27 (mod 29) d) x = 4, 28 (mod 29) vi) In symmetric-key cryptography, the key locks and unlocks the box is a) Same b) shared c) Private d) public vii) The ciphers of today are called round ciphers because they involve a) Single Round b) Double Rounds c) Multiple Round d) Round about viii) Symmetric-key cryptography started thousands of years ago when people needed to exchange a) Files b) Packets c) Secrets d) Transmission ix) A transposition cipher reorders (permutes) symbols in a a) block of packets b) block of slots c) block of signals d) block of symbols x) In Cryptography, when text is treated at the bit level, each character is replaced by a) 4 Bits b) 6 Bits c) 8 Bits d) 10 Bits