Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 1

GHANASHYAM HEMALATA INSTITUTE OF TECHNOLOGY & MANAGEMENT, PURI

CLASS TEST – II (2018-19)


CRYPTOGRAPHY & NETWORK
Subject Subject Code Max. Marks 25
SECURITY
Branch Computer Science & Engineering Semester 7th Semester Time 01 hr.
Name Roll no/ Regd no

Marks Secured: .........................

In Words: Signature Of Invigilator(S) Signature of Examiner


All Questions are compulsory
Right hand side figures indicate marks
1. Fill in the blanks (1X5)
i) In_______________ cipher, the message is encrypted by substituting the letter of the alphabet n places
ahead of the current letter.
ii) The _________________ telegram is one of the first examples from the last century of the role that
cryptanalysis has had in political and military affairs
iii) TEA uses a 64-bit block length and a ______bit key.
iv) A ______MAC is a standard approach to provide data integrity.
v) A stream cipher takes a key K of n bits in length and stretches it into a long ___________.
2. Multiple answer type (Write down the correct answer) (2X10)
i) AES uses a ____________ bit block size and a key size of __________ bits.
a) 128; 128 or 256 b) 64; 128 or 192
c) 256; 128, 192, or 256 d) 128; 128, 192, or 256
ii) Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and
Serpent?
a) JUPITER b) Blowfish
c) Serpent d) Rijndael
iii) How many rounds does the AES-256 perform?
a) 10 b) 12
c) 14 d) 16
iv) Find x for the CRT when x= 2 mod 3; x= 3 mod 5; x = 2 mod 7
a) 33 b) 22
c) 23 d) 31
2
v) 17 x = 10 ( mod 29 )
a) x = 3, 22 (mod 29) b) x = 7, 28 (mod 29)
c) x = 2, 27 (mod 29) d) x = 4, 28 (mod 29)
vi) In symmetric-key cryptography, the key locks and unlocks the box is
a) Same b) shared
c) Private d) public
vii) The ciphers of today are called round ciphers because they involve
a) Single Round b) Double Rounds
c) Multiple Round d) Round about
viii) Symmetric-key cryptography started thousands of years ago when people needed to exchange
a) Files b) Packets
c) Secrets d) Transmission
ix) A transposition cipher reorders (permutes) symbols in a
a) block of packets b) block of slots
c) block of signals d) block of symbols
x) In Cryptography, when text is treated at the bit level, each character is replaced by
a) 4 Bits b) 6 Bits
c) 8 Bits d) 10 Bits

You might also like