Home » Cryptography » Cryptography MCQs

# MCQ | Block Cipher as IDEA, DES, AES, RSA in Cryptography

Here, we have a **set of multiple-choice questions and answers (quiz) on Block Cipher as IDEA, DES, AES, RSA in Cryptography**.

Submitted by Monika Sharma, on March 22, 2020

**1) In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.**

- 5 similar rounds having 2 pair ; every alternate
- 9 ; the last
- 8 ; the first and last
- 10 ; no

**Answer:** b. 9; the last

**Explanation:**

Basically, in the AES-128 there are 9 rounds and the last round is different from other rounds.

**2) Which of the following modes of operation in DES is used for operating?**

- Cipher Feedback Mode (CFB)
- Cipher Block chaining (CBC)
- Electronic code book (ECB)
- Output Feedback Modes (OFB)

**Answer:** c. Electronic code book (ECB)

**Explanation:**

Mainly, the Electronic codebook mode is used for operating on short data as the same key is used for each block in this algorithm. Thus convert in Plain Text lead to repetitions in Cipher Text in cryptography.

**3) Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:**

- 42
- 93
- 114
- 103

**Answer:** c. 114

**Explanation:**

Calculate n = p × q = 63 Phi(n)=(p-1) x (q-1)=48 Let e=5 , where gcd(e,phi(n))=1 Plaintext M = 24 Ciphertext = C ≡ M^e (mod n) = 24^5 mod 63 = 7962624 mod 161 Ciphertext transmitted = 114.

**4) International Data Encryption Algorithm (IDEA) was developed by**

- Xuejia Lai and James Massey
- Xuejia Lai and Bruce Schneier
- Xuejia Lai and Carlisle Adams
- Xuejia Lai and Stafford Tavares

**Answer:** a. Xuejia Lai and James Massey

**Explanation:**

It is a symmetric key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and in 1991 it firstly described it.

**5) When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?**

- f function
- permutation p
- swapping of halves
- xor of subkey with function f

**Answer:** c. swapping of halves

**Explanation:**

Mainly, there is no equivalent to swapping of halves in the AES algorithm in cryptography.

**6) Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.**

- 16 bits
- 64 bits
- 32 bits
- All of the mentioned above

**Answer:** b. 64 bits

**Explanation:**

When using the Data Encryption Standard, data is encrypted in blocks of 64 bits apiece, which means that the data encryption standard requires 64 bits of plain text to be entered as input?

**7) The process of decryption of an AES ciphertext is similar to the encryption process in the ______.**

- Reverse order
- Next order
- Both A and B
- All of the mentioned above

**Answer:** a. Reverse order

**Explanation:**

The process of decrypting an AES ciphertext is quite similar to the process of encrypting it, except that it is done in the opposite order. Each round is comprised of the four processes, which are carried out in the opposite sequence of the previous round. Due to the fact that sub-processes in each round are carried out in reverse order, as opposed to a Feistel Cipher, the encryption and decryption algorithms must be developed separately, despite the fact that they are extremely closely connected.

**8) AES stands for Advanced Encryption Standard,**

- True
- False

**Answer:** a. True

**Explanation:**

Advanced Encryption Standard (AES) is an abbreviation for Advanced Encryption Standard. It was thought to be vulnerable to an exhaustive key search attack because of the increase in computational capacity. AES is an iterative cypher, as opposed to a Feistel cypher. Based on the ‘substitution–permutation network,' it is a powerful tool. It is made up of a sequence of connected operations, some of which require substituting certain inputs with specified outputs (substitutions), and others which entail shuffling bits around (permutations).

**9) RSA algorithm is ____ cryptography algorithm.**

- Systematic
- Symmetric
- Asymmetric
- None of the mentioned above

**Answer:** c. Asymmetric

**Explanation:**

The RSA algorithm is a symmetric cryptography algorithm that uses a random number generator. Asymmetric refers to the fact that it operates on two separate keys, namely the Public Key and the Private Key.

**10) Amongst which of the following is / are true with reference to the rounds in AES –**

- Byte Substitution
- Shift Row
- Mix Column and Key Addition
- All of the mentioned above

**Answer:** d. All of the mentioned above

**Explanation:**

The rounds in AES are as follows: Byte Substitution, Shift Row, Mix Column, and Key Addition (in order of appearance).

**More...**

- MCQ | Cryptography Basics
- MCQ | Cryptography Ciphers (Level: Easy) | Set 1
- MCQ | Cryptography Ciphers (Level: Easy) | Set 2
- MCQ | Cryptography Hash Functions (Level: Easy)
- MCQ | Cryptography Techniques of Block Cipher
- MCQ | Quantum Cryptography
- MCQ | Hash Function Technique
- MCQ | Modes of Operations in Block Cipher

What's New

- Business Environment MCQs
- Sustainable Development MCQs
- Marginal Costing and Absorption Costing MCQs
- Globalisation MCQs
- Indian Economy MCQs
- Retained Earnings MCQs
- Depreciation MCQs
- Partnership MCQs
- Sole Proprietorship MCQs
- Goods and Services Tax (GST) MCQs
- Cooperative Society MCQs
- Capital Market MCQs
- Business Studies MCQs
- Basic Accounting MCQs
- MIS Executive Interview Questions
- Go Language Interview Questions

Top Interview Coding Problems/Challenges!

- Run-length encoding (find/print frequency of letters in a string)
- Sort an array of 0's, 1's and 2's in linear time complexity
- Checking Anagrams (check whether two string is anagrams or not)
- Relative sorting algorithm
- Finding subarray with given sum
- Find the level in a binary tree with given sum K
- Check whether a Binary Tree is BST (Binary Search Tree) or not
- 1[0]1 Pattern Count
- Capitalize first and last letter of each word in a line
- Print vertical sum of a binary tree
- Print Boundary Sum of a Binary Tree
- Reverse a single linked list
- Greedy Strategy to solve major algorithm problems
- Job sequencing problem
- Root to leaf Path Sum
- Exit Point in a Matrix
- Find length of loop in a linked list
- Toppers of Class
- Print All Nodes that don't have Sibling
- Transform to Sum Tree
- Shortest Source to Destination Path

Comments and Discussions!