Exam 20230906 17525

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

06/09/2023 :‫ﺍﻟﺘﺄﺭﻳﺦ‬ ‫ﺟﺎﻣﻌﺔ ﺍﻟﻌﻠﻮﻡ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ‬

‫ ﺃﻣﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ‬:‫ﺍﻟﻤﻘﺮﺭ‬ ‫ﻛﻠﻴﺔ ﺍﻟﺤﺎﺳﺒﺎﺕ ﻭﺍﻟﻤﻌﻠﻮﻣﺎﺕ‬


‫ ﻓﻬﺪ ﺁﻝ ﻗﺎﺳﻢ‬:‫ﺍﻟﻤﺪﺭﺱ‬ ‫ﻗﺴﻢ ﺗﻘﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ‬
‫ ﺳﺎﻋﺔ ﻭﺍﺣﺪﺓ‬:‫ﺍﻟﺰﻣﻦ‬ ‫ﺑﺮﻧﺎﻣﺞ ﺗﻘﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ‬

First Term- MidTerm Exam- 1445H


1 - Answer All The Folwing Questions
1. Give an example of cryptography tools that used for encrypting confidential text in your message.
2. Explain shortly the reason of why NIST published SHA.
3. Explain shortly why they may use MD5 Calculator?
4. What is HMAC stand for?
5. Compare between public key and private key using in cryptography process.
6. How does AEDA mode thwart chosen ciphertext attacks?
7. Descripe the general process of transforming plaintext of ciphertext using symmetric and using
asymmetric ciphers.
8. Explain shortly the purpose of Encrypt-then-MAC mode.
9. Give one difference between integrity and confidentiality.
10. Explain the name and the process of the archetypal block cipher .
2 - MCQ: Multiple Choice Questions
1. Increasing encryption process efficiency in low latency applications is done using ..........................
cryptography.
a. symmetric . b. fast.
c. strong. d. asymmetric .
2. A parameterized algorithm with a variable block size, variable key size, and variable number of rounds.
a. RC3. b. RC5.
c. RC6. d. RC4.
3. An algorithm that can be used in the generation and verification of digital signatures for sensitive
applications.
a. DSA. b. DES.
c. AES. d. RSA.
4. An asymmetric algorithm inwhich encryption and decryption are done by the same key holder.
a. Homomorphic Encryption. b. Elliptic Curve Cryptography.
c. Digital Signature Algorithm. d. Quantum cryptography.
5. ............ encryption is a type of encryption that uses the same key by sender and reciver.
a. symmetric. b. public .
c. private. d. asymmetric.
6. The process of data conversion into scrambled code that sent across private and public network.
a. encryption . b. encoding .
c. decoding. d. decryption .
............ ‫ ﺍﻟﺘﻌﺎﻣﻞ ﻣﻊ ﺍﻟﺸﺒﻜﺎﺕ ﻭﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻳﺤﺘﺎﺝ ﺇﻟﻰ ﺷﺨﺺ ﻋﻨﺪﻩ ﺧﺒﺮﺓ ﻛﺒﻴﺮﺓ ﻓﻲ‬.7
a. ..... b. ..
c. .. d. ..
8. Substitution cipher is one of ......................... ciphers
a. classical . b. strong.
c. excelent. d. modern .
9. Ciphers are ................ used to encrypt or decrypt the data.
a. algorithms. b. devices.
c. softwares. d. protocols.
10. Hash value may called .........................
a. message digest. b. memory digest.
c. lightprinting. d. footprinting.
11. ................... is designed to encipher and decipher blocks of data consisting of 64 bits and 56 bit key.
a. DES. b. CR6.
c. CR5. d. AES.
12. Private key encryption is used ................. amount of data.
a. large. b. best.
c. bad. d. small.
13. ............ is an internet encryption and authentication system that its algorithm was developed by three
scientists and it takes thier names first letters.
a. RSA. b. DES.
c. AES. d. DSA.
14. 3DES ciphers are used instade of DES, due to the inherent ................ of DES.
a. weakness. b. fastness.
c. slowness. d. strength.
15. SHA is a hash function, is an abbriviation of .............................. algorithm
(1 - 3)
06/09/2023 :‫ﺍﻟﺘﺄﺭﻳﺦ‬ ‫ﺟﺎﻣﻌﺔ ﺍﻟﻌﻠﻮﻡ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ‬
‫ ﺃﻣﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ‬:‫ﺍﻟﻤﻘﺮﺭ‬ ‫ﻛﻠﻴﺔ ﺍﻟﺤﺎﺳﺒﺎﺕ ﻭﺍﻟﻤﻌﻠﻮﻣﺎﺕ‬
‫ ﻓﻬﺪ ﺁﻝ ﻗﺎﺳﻢ‬:‫ﺍﻟﻤﺪﺭﺱ‬ ‫ﻗﺴﻢ ﺗﻘﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ‬
‫ ﺳﺎﻋﺔ ﻭﺍﺣﺪﺓ‬:‫ﺍﻟﺰﻣﻦ‬ ‫ﺑﺮﻧﺎﻣﺞ ﺗﻘﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ‬

a. secure hashing. b. saver hashing.


c. saving digest. d. secure digest.
16. Key stretching is the process of ................. a key that might be too .......... usally by making it ................
a. strenghening, weak, longer. b. weak, strenghening, longer,.
c. longer, weak, strenghening. d. strenghening, longer, weak.
17. ..................... is a symmetric alogrithm that may has a 128-bit block size with key sizes of 128 bits for
.......-128 version or longer.
a. DES. b. SSL.
c. TSL. d. AES.
18. Hash functions are .......... way encryption techniques.
a. one. b. three.
c. four. d. two.
19. .... is a symmetric key block cipher derived from .......... with two additional features.
a. RC6, RC5. b. RC4, RC3.
c. RC5, RC6. d. RC3, RC4.
20. DSA and RSA are both ......................... algorithm
a. symmetric. b. de-facto.
c. standard. d. asymmetric.
21. Sponge construction is used for solving the problem of block size in .......................
a. SHA-3. b. SHA-4.
c. SHA-1. d. SHA-2.
22. The scramble code that results from the conversion of data is called .......
a. ciphertext. b. encryption.
c. decryption. d. plaintext.
23. A derivation of the .................. algorihm is converted to hashing algorithm to hash a password and add
salt to it for key stetching purposes.
a. blowfish . b. nanofish.
c. microfish. d. bluefish.
24. ......... is developed to avoid larger cryptographic private and public key usage.
a. Elliptic Curve Cryptography. b. Homomorphic Encryption.
c. Digatal Signature Algorithm. d. Quantum Cryptography.
25. One of the following is not an objective of cryptography.
a. spamming. b. confidentiality.
c. authentication . d. integrity.
26. Has functions are not deployed for ..............
a. plaintext data ecncryption . b. digital signature applications.
c. storing passwords. d. file integrity checking.
27. AES is used by US government agencies, it is a .................................... algorithm
a. symmetric-key. b. private.
c. public. d. asymmetric-key.
28. ................... cryptography algorihms are aimed at low-complexity applications such as RFID tags.
a. lightweight. b. heavyweight.
c. highweight. d. lightcost.
29. Individuals and organizations use digital ...................... to enusre non-repudiation.
a. signature. b. obfuscation.
c. decoder. d. encoder.
30. An advanced cryptographic algorithm designed to protect security for both conventional and quantum
computers.
a. post-quantum cryptography. b. homomorphic encryption .
c. elliptic curve cryptography. d. quantum cryptography.
31. Length extension attaks can be prvented using .................................. hash technique.
a. HMAC. b. MD6.
c. SHA-4. d. MAC.
32. It is recommended to use modern algorihm than MD5 due to it non ............. resistant.
a. collision. b. obfuscation.
c. attacks. d. encryption.
33. ............ encryption is a type of encryption that uses a key by sender and differnet key by reciver.
a. symmetric. b. public.
c. private. d. asymmetric.
34. ............ takes a message as the input and then outputs a 128-bits fingerprint or message digest of the
input.
a. MD5. b. MD6.
c. MD7. d. MD4.

(2 - 3)
06/09/2023 :‫ﺍﻟﺘﺄﺭﻳﺦ‬ ‫ﺟﺎﻣﻌﺔ ﺍﻟﻌﻠﻮﻡ ﻭﺍﻟﺘﻜﻨﻮﻟﻮﺟﻴﺎ‬
‫ ﺃﻣﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ ﻭﺍﻟﺸﺒﻜﺎﺕ‬:‫ﺍﻟﻤﻘﺮﺭ‬ ‫ﻛﻠﻴﺔ ﺍﻟﺤﺎﺳﺒﺎﺕ ﻭﺍﻟﻤﻌﻠﻮﻣﺎﺕ‬
‫ ﻓﻬﺪ ﺁﻝ ﻗﺎﺳﻢ‬:‫ﺍﻟﻤﺪﺭﺱ‬ ‫ﻗﺴﻢ ﺗﻘﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ‬
‫ ﺳﺎﻋﺔ ﻭﺍﺣﺪﺓ‬:‫ﺍﻟﺰﻣﻦ‬ ‫ﺑﺮﻧﺎﻣﺞ ﺗﻘﻨﻴﺔ ﺍﻟﻤﻌﻠﻮﻣﺎﺕ‬

35. ............. is used to protect confidential data such as email messages.

a. cryptography. b. stagnography.
c. ciphertext. d. cryptoanalysis.
36. public key encryption is used ................. amount of data.
a. large. b. best.
c. bad. d. small.
37. One of the following is not from the limitations of cryptography
a. lightweight devices. b. computational overhead.
c. entropy. d. speed.
38. Hiding the content of data is one of crytpography goals by using ..................... techniques.
a. obfuscation. b. lightweight.
c. decryption. d. encryption .
39. Public key encryption algorithm can used in low-power devices such as .......................
a. ECC. b. DSA.
c. AES. d. RSA.
40. One of the following is not a public key encryption algorithm.
a. AES. b. DSA.
c. ECC. d. RSA.

(3 - 3)

You might also like