Home » Cryptography » Cryptography MCQs

# MCQ | Cryptography Basics

Here, we have a set of **multiple-choice questions and answers (quiz) on cryptography basics** (basic concepts of cryptography techniques).

Submitted by Monika Sharma, on February 02, 2020

**1) Which of the following is not a type of symmetric-key cryptography technique?**

- Caesar cipher
- Data Encryption Standard (DES)
- Diffie Hellman cipher
- Playfair cipher

**Answer:** c) Diffie Hellman cipher

**Explanation:**

The Diffie Hellman uses a pair of asymmetric keys for encryption and decryption processes. All the rest mentioned cipher techniques use the same key for encryption as well as decryption.

**2) Which of the following is not a principle of data security?**

- Data Confidentiality
- Data Integrity
- Authentication
- None of the above

**Answer:** d) None of the above

**Explanation:**

All the first three options are the principles of data security. None of the mentioned characteristics fall apart form these principles. Therefore, the correct answer is none of the above.

**3) Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?**

- Masquerade
- Modification of message
- Denial of service
- Traffic analysis

**Answer:** d) Traffic analysis

**Explanation:**

In a passive attack, the attacker does not modify any part of the data. His attempt is only to obtain the information and not to modify it. From the mentioned options, this happens only in Traffic analysis in which the attacker monitors the pattern of transmission. The rest other options are examples of active attacks.

**4) Which of the following options correctly defines the Brute force attack?**

- Brutally forcing the user to share the useful information like pins and passwords.
- Trying every possible key to decrypt the message.
- One entity pretends to be some other entity
- The message or information is modified before sending it to the receiver.

**Answer:** b) Trying every possible key to decrypt the message.

**Explanation:**

Only option b) is the correct definition for brute force attack.

**5) "A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext." Which of the following is capable of becoming a key in a cryptographic algorithm?**

- An integer values
- A square matrix
- An array of characters (i.e. a string)
- All of the above

**Answer:** d) All of the above

**Explanation:**

As the key can be any string of bits, all the mentioned options are capable of becoming a key in a cryptographic algorithm.

**6) A mechanism used to encrypt and decrypt data.**

- Cryptography
- Algorithm
- Data flow
- None of these

**Answer:** a) Cryptography

**Explanation:**

Cryptography is a mechanism used to encrypt and decrypt data.

**7) To encrypt the plaintext, a cryptographic algorithm works in combination with a key...**

- Word, number, or phrase
- Special Symbols
- Function Keys
- All of these

**Answer:** a) word, number and phrase

**Explanation:**

Word, number and phrase are used to encrypt the plaintext.

**8) The plaintext encrypts to different cipher text with different keys**

- True
- False

**Answer:** a) True

**Explanation:**

The plaintext is used to encrypt to different cipher text with different keys.

**9) Conventional cryptography also known as ... encryption.**

- asymmetric-key
- logical-key
- symmetric-key
- None of these

**Answer:** c) symmetric-key

**Explanation:**

Conventional cryptography also known as symmetric-key encryption.

**10) The Data Encryption Standard (DES) is an example of a ...**

- Conventional cryptosystem
- Asymmetric cryptosystem
- Caesar's cryptosystem
- All of these

**Answer:** a) Conventional cryptosystem

**11) Public key cryptography is a ... cryptosystem**

- Symmetric
- Asymmetric
- Symmetric & Asymmetric both
- None of these

**Answer:** b) Asymmetric cryptosystem

**Explanation:**

Asymmetric is a public key cryptography.

**12) Security Goals of Cryptography are**

- Confidentiality
- Authenticityn
- Data integrityn
- Non-repudiation
- All of these

**Answer:** e) All of these

**Explanation:**

Confidentiality, authenticity, data integrity and non-repudiation security are the key goals of cryptography.

**13) A process of studying cryptographic system is known as Cryptanalysis**

- True
- False

**Answer:** a) True

**Explanation:**

Cryptanalysis is a process of studying cryptographic system.

**14) Cipher in cryptography is –**

- Encrypted message
- Algorithm for performing encryption and decryption
- Both algorithm for performing encryption and decryption and encrypted message
- Decrypted message

**Answer:** b) algorithm for performing encryption and decryption

**Explanation:**

Cipher in cryptography is an Algorithm for performing encryption and decryption.

**15) The private key in asymmetric key cryptography is kept by**

- Sender
- Receiver
- Sender and receiver
- All the connected devices to the network

**Answer:** b) Receiver

**Explanation:**

The private key is kept by the receiver.

**16) Which one of the following algorithms is not used in asymmetric-key cryptography?**

- DSA algorithm
- Electronic code book algorithm
- Diffie-Hellman algorithm
- RSA algorithm

**Answer:** b) Electronic code book algorithm

**Explanation:**

The electronic code book algorithm is a block cypher method in which a block of data corresponds to each block of text in the encrypted message.

**17) Which is the cryptographic protocol that is used to protect an HTTP connection?**

- Resource reservation protocol
- SCTP
- TLS
- ECN

**Answer:** c) TLS (Transport Layer Security)

**Explanation:**

In order to prevent eavesdropping, tampering and message forgery, TLS has strong message authentication and key-material generation.

**18) A key is a value that works with a cryptographic algorithm to produce a specific cipher text.**

- True
- False

**Answer:** a) True

**Explanation:**

A key is a value that works with a cryptographic algorithm to produce a specific cipher text.

**19) A Public key size and conventional cryptography’s secret key size are closely related with one another.**

- True
- False

**Answer:** b) False

**Explanation:**

A Public key size and conventional cryptography’s secret key size are unrelated with one another.

**20) ElGamal encryption system is an asymmetric key encryption algorithm.**

- Public-key cryptography
- Private-key cryptography
- Both
- None of these

**Answer:** a) Public-key cryptography

**Explanation:**

The ElGamal encryption scheme in cryptography is an asymmetrical key encryption algorithm based on the Diffie-Hellman key exchange for public-key cryptography.

**More...**

- MCQ | Cryptography Ciphers (Level: Easy) | Set 1
- MCQ | Cryptography Ciphers (Level: Easy) | Set 2
- MCQ | Cryptography Hash Functions (Level: Easy)
- MCQ | Cryptography Techniques of Block Cipher
- MCQ | Block Cipher as IDEA, DES, AES, RSA in Cryptography
- MCQ | Quantum Cryptography
- MCQ | Hash Function Technique
- MCQ | Modes of Operations in Block Cipher

What's New

- C Language MCQs
- Python MCQs
- Perl MCQs
- MongoDB MCQs
- Java MCQs
- C# MCQs
- Scala MCQs
- Blockchain MCQs
- AutoCAD MCQs
- PHP MCQs
- JavaScript MCQs
- jQuery MCQs
- ReactJS MCQs
- AngularJS MCQs
- JSON MCQs
- Ajax MCQs
- SASS MCQs
- HTML MCQs
- Advanced CSS MCQs
- CSS MCQs
- PL/SQL MCQs
- SQL MCQs
- MS Word MCQs
- PL/SQL MCQs
- SQL MCQs
- Software Engineering MCQs
- Data Analytics and Visualization MCQs
- MIS MCQs
- Linux MCQs
- WordPress MCQs
- Blogging MCQs

- Generally Accepted Accounting Principles MCQs
- Bills of Exchange MCQs
- Business Environment MCQs
- Sustainable Development MCQs
- Marginal Costing and Absorption Costing MCQs
- Globalisation MCQs
- Indian Economy MCQs
- Retained Earnings MCQs
- Depreciation MCQs
- Partnership MCQs
- Sole Proprietorship MCQs
- Goods and Services Tax (GST) MCQs
- Cooperative Society MCQs
- Capital Market MCQs
- Business Studies MCQs
- Basic Accounting MCQs
- MIS Executive Interview Questions
- Go Language Interview Questions

Top Interview Coding Problems/Challenges!

- Run-length encoding (find/print frequency of letters in a string)
- Sort an array of 0's, 1's and 2's in linear time complexity
- Checking Anagrams (check whether two string is anagrams or not)
- Relative sorting algorithm
- Finding subarray with given sum
- Find the level in a binary tree with given sum K
- Check whether a Binary Tree is BST (Binary Search Tree) or not
- 1[0]1 Pattern Count
- Capitalize first and last letter of each word in a line
- Print vertical sum of a binary tree
- Print Boundary Sum of a Binary Tree
- Reverse a single linked list
- Greedy Strategy to solve major algorithm problems
- Job sequencing problem
- Root to leaf Path Sum
- Exit Point in a Matrix
- Find length of loop in a linked list
- Toppers of Class
- Print All Nodes that don't have Sibling
- Transform to Sum Tree
- Shortest Source to Destination Path

Comments and Discussions!