# MCQ | Cryptography Ciphers (Level: Easy) | Set 2

Here, we have a set of **multiple-choice questions and answers (quiz) on ciphers in Cryptography** (basic concepts of Cryptography Techniques and different types of ciphers).

Submitted by Monika Sharma, on February 02, 2020

**1) You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,**

A = [ 4 2 2 1 ]

**Is the given matrix 'A', a valid key to be used for encryption?**

- Yes
- No
- Can't be determined
- Data insufficient

**Answer:** b) No

**Explanation:**

For choosing any square matrix as a key, it should be taken care that the matrix is invertible, i.e. its inverse must exist. Here, in this case,

| A | = 0

Therefore, it means that 'A' is not an invertible matrix. Hence matrix 'A' cannot be chosen as a key matrix for encryption in the Hill cipher.

**2) The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?**

- The input text is divided into two parts: one being left half and another one being right half.
- Swapping of the left and right halves are performed after each round.
- The plain text is converted into a matrix form first
- None of the above

**Answer:** c) The plain text is converted into a matrix form first

**Explanation:**

The fiestal structure does not require the conversion of the plain text into matrix form at any of its steps.

**3) Among the following given options, chose the strongest encryption technique?**

- DES ( Data Encryption Standard)
- Double DES
- Triple DES
- AES (Advance Encryption Standard)

**Answer:** d) AES (Advance Encryption Standard)

**Explanation:**

It has been proved that the AES performs much better than the all the other DES, whether it be single DES or series of DES.

**4) What is the full-form of RSA in the RSA encryption technique?**

- Round Security Algorithm
- Rivest, Shamir, Adleman
- Robert, Shamir, Addie
- None of the above

**Answer:** b) Rivest, Shamir, Adleman

**Explanation:**

The RSA algorithm was named after the three scientists who developed this technique and the name RSA is itself the abbreviation of their names: Rivest, Shamir, and Adleman.

**5) Consider the following steps,**

- Substitution bytes
- Shift Rows
- Mix columns
- Add round key

**The above steps are performed in each round of which of the following ciphers?**

- Rail fence cipher
- Data Encryption Standard (DES)
- Advance Encryption Standard (AES)
- None of the above

**Answer:** c) Advance Encryption Standard (AES)

**Explanation:**

Each round of AES includes the mentioned steps.

**More...**

- MCQ | Cryptography Basics
- MCQ | Cryptography Ciphers (Level: Easy) | Set 1
- MCQ | Cryptography Hash Functions (Level: Easy)
- MCQ | Cryptography Techniques of Block Cipher
- MCQ | Block Cipher as IDEA, DES, AES, RSA in Cryptography
- MCQ | Quantum Cryptography
- MCQ | Hash Function Technique
- MCQ | Modes of Operations in Block Cipher

TOP Interview Coding Problems/Challenges

- Run-length encoding (find/print frequency of letters in a string)
- Sort an array of 0's, 1's and 2's in linear time complexity
- Checking Anagrams (check whether two string is anagrams or not)
- Relative sorting algorithm
- Finding subarray with given sum
- Find the level in a binary tree with given sum K
- Check whether a Binary Tree is BST (Binary Search Tree) or not
- 1[0]1 Pattern Count
- Capitalize first and last letter of each word in a line
- Print vertical sum of a binary tree
- Print Boundary Sum of a Binary Tree
- Reverse a single linked list
- Greedy Strategy to solve major algorithm problems
- Job sequencing problem
- Root to leaf Path Sum
- Exit Point in a Matrix
- Find length of loop in a linked list
- Toppers of Class
- Print All Nodes that don't have Sibling
- Transform to Sum Tree
- Shortest Source to Destination Path

Comments and Discussions