Home » Cryptography » Cryptography MCQs

# MCQ | Cryptography Ciphers (Level: Easy)

Here, we have a set of **multiple-choice questions and answers (quiz) on ciphers in Cryptography** (basic concepts of Cryptography Techniques and different types of ciphers).

Submitted by Monika Sharma, on February 02, 2020

**1) We are provided the plain text “SUN”. You need to convert the given plain text into ciphertext under the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the given text if the key is 2?**

- UWP
- NUS
- WUP
- QSL

**Answer:** a) UWP

**Explanation:**

In the Caesar cipher technique, the encryption is performed as follows,

E ( P , K ) = ( P + K ) mod 26 Therefore, E ( S , 2 ) = ( 18 + 2 ) mod 26 = 20 = U E ( U , 2 ) = ( 20 + 2 ) mod 26 = 22 = W E ( N , 2 ) = ( 13 + 2 ) mod 26 = 15 = P Hence, the ciphertext is "UWP".

**2) Which of the following cannot be chosen as a key in the Caesar cipher?**

- An integer
- An alphabet (A-Z or a-z)
- A string
- None of the above

**Answer:** c) A string

**Explanation:**

In Caesar cipher, we can choose a number or a character which when performed addition modulo operation with the given letters of the plain text gives us ciphertext. However, a string cannot be chosen for encryption in this case.

**3) Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?**

- Hill Cipher
- Playfair cipher
- Both a and b
- None of the above

**Answer:** c) Both a and b

**Explanation:**

The hill cipher includes a square matrix as the key, and in Playfair cipher, we create a 5X5 matrix using the given key string. Hence, both these ciphers include the use of matrices.

**4) Which of the following ciphers is a block cipher?**

- Caesar cipher
- Vernam cipher
- Playfair cipher
- None of the above

**Answer:** c) Playfair cipher

**Explanation:**

The Playfair cipher uses a block of plain text, each block containing 2 characters.

**5) Which of the following ciphers uses asymmetric key cryptography?**

- Rail Fence Cipher
- Data Encryption Standard (DES)
- Diffie Hellman Cipher
- None of the above

**Answer:** c) Diffie Hellman Cipher

**Explanation:**

The Diffie Hellman cipher uses asymmetric key cryptography. It uses a pair of keys, one private and one public.

**6) "Cipher" is synonymous with "code",**

- True
- False

**Answer:** a) True

**Explanation:**

In cryptography, the terms "cypher" and "code" are synonymous since they both refer to a sequence of processes that encrypt a message; nonetheless, the ideas are separate in cryptography, particularly classical cryptography.

**7) Block ciphers accumulate symbols in a message of a ______.**

- Fixed size
- Variable
- Integration
- All of the mentioned above

**Answer:** a) Fixed size

**Explanation:**

Block cyphers amass symbols in a message of a fixed size (the block), whereas stream cyphers operate on a stream of symbols that is constantly changing. When a cypher employs the same key for both encryption and decryption, the algorithm or cypher is referred to as a symmetric key algorithm. Asymmetric key algorithms, also known as cyphers, encrypt and decrypt data using a different key for each operation.

**8) With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.**

- Different
- Same
- Both A and B
- None of the mentioned above

**Answer:** b) Same

**Explanation:**

When using symmetric key techniques, the same key is utilized for both the encryption and decryption of the information being transmitted. Asymmetric key algorithms, which encrypt and decrypt data using public and private keys, are used to protect sensitive information.

**9) ____ is the message or data that can be readable by the sender.**

- Edited
- Main Text
- Plain text
- All of the mentioned above

**Answer:** c) Plain text

**Explanation:**

Plain text is a message or data that may be read by the sender, the receiver, or any third party who happens to come across it. When plain text is altered by the application of certain algorithms or procedures, the resulting data or message is referred to as ciphertext.

**10) In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.**

- Passcode or a password
- Developed code
- Network set
- None of the mentioned above

**Answer:** a) Passcode or a password

**Explanation:**

With symmetric key encryption, the secret key that both parties have access to can be anything, such as a passcode or a password, depending on the circumstances. Also, a random string of characters or numbers generated using a secure Random Number Generator (RNG) can be used to represent it.

**More...**

- MCQ | Cryptography Basics
- MCQ | Cryptography Ciphers (Level: Easy) | Set 2
- MCQ | Cryptography Hash Functions (Level: Easy)
- MCQ | Cryptography Techniques of Block Cipher
- MCQ | Block Cipher as IDEA, DES, AES, RSA in Cryptography
- MCQ | Quantum Cryptography
- MCQ | Hash Function Technique
- MCQ | Modes of Operations in Block Cipher

What's New

- C Language MCQs
- Python MCQs
- Perl MCQs
- MongoDB MCQs
- Java MCQs
- C# MCQs
- Scala MCQs
- Blockchain MCQs
- AutoCAD MCQs
- PHP MCQs
- JavaScript MCQs
- jQuery MCQs
- ReactJS MCQs
- AngularJS MCQs
- JSON MCQs
- Ajax MCQs
- SASS MCQs
- HTML MCQs
- Advanced CSS MCQs
- CSS MCQs
- PL/SQL MCQs
- SQL MCQs
- MS Word MCQs
- PL/SQL MCQs
- SQL MCQs
- Software Engineering MCQs
- Data Analytics and Visualization MCQs
- MIS MCQs
- Linux MCQs
- WordPress MCQs
- Blogging MCQs

- Generally Accepted Accounting Principles MCQs
- Bills of Exchange MCQs
- Business Environment MCQs
- Sustainable Development MCQs
- Marginal Costing and Absorption Costing MCQs
- Globalisation MCQs
- Indian Economy MCQs
- Retained Earnings MCQs
- Depreciation MCQs
- Partnership MCQs
- Sole Proprietorship MCQs
- Goods and Services Tax (GST) MCQs
- Cooperative Society MCQs
- Capital Market MCQs
- Business Studies MCQs
- Basic Accounting MCQs
- MIS Executive Interview Questions
- Go Language Interview Questions

Top Interview Coding Problems/Challenges!

- Run-length encoding (find/print frequency of letters in a string)
- Sort an array of 0's, 1's and 2's in linear time complexity
- Checking Anagrams (check whether two string is anagrams or not)
- Relative sorting algorithm
- Finding subarray with given sum
- Find the level in a binary tree with given sum K
- Check whether a Binary Tree is BST (Binary Search Tree) or not
- 1[0]1 Pattern Count
- Capitalize first and last letter of each word in a line
- Print vertical sum of a binary tree
- Print Boundary Sum of a Binary Tree
- Reverse a single linked list
- Greedy Strategy to solve major algorithm problems
- Job sequencing problem
- Root to leaf Path Sum
- Exit Point in a Matrix
- Find length of loop in a linked list
- Toppers of Class
- Print All Nodes that don't have Sibling
- Transform to Sum Tree
- Shortest Source to Destination Path

Comments and Discussions!