# MCQ | Cryptography Ciphers (Level: Easy)

Here, we have a set of **multiple-choice questions and answers (quiz) on ciphers in Cryptography** (basic concepts of Cryptography Techniques and different types of ciphers).

Submitted by Monika Sharma, on February 02, 2020

**1) We are provided the plain text “SUN”. You need to convert the given plain text into ciphertext under the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the given text if the key is 2?**

- UWP
- NUS
- WUP
- QSL

**Answer:** a) UWP

**Explanation:**

In the Caesar cipher technique, the encryption is performed as follows,

E ( P , K ) = ( P + K ) mod 26 Therefore, E ( S , 2 ) = ( 18 + 2 ) mod 26 = 20 = U E ( U , 2 ) = ( 20 + 2 ) mod 26 = 22 = W E ( N , 2 ) = ( 13 + 2 ) mod 26 = 15 = P Hence, the ciphertext is "UWP".

**2) Which of the following cannot be chosen as a key in the Caesar cipher?**

- An integer
- An alphabet (A-Z or a-z)
- A string
- None of the above

**Answer:** c) A string

**Explanation:**

In Caesar cipher, we can choose a number or a character which when performed addition modulo operation with the given letters of the plain text gives us ciphertext. However, a string cannot be chosen for encryption in this case.

**3) Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?**

- Hill Cipher
- Playfair cipher
- Both a and b
- None of the above

**Answer:** c) Both a and b

**Explanation:**

The hill cipher includes a square matrix as the key, and in Playfair cipher, we create a 5X5 matrix using the given key string. Hence, both these ciphers include the use of matrices.

**4) Which of the following ciphers is a block cipher?**

- Caesar cipher
- Vernam cipher
- Playfair cipher
- None of the above

**Answer:** c) Playfair cipher

**Explanation:**

The Playfair cipher uses a block of plain text, each block containing 2 characters.

**5) Which of the following ciphers uses asymmetric key cryptography?**

- Rail Fence Cipher
- Data Encryption Standard (DES)
- Diffie Hellman Cipher
- None of the above

**Answer:** c) Diffie Hellman Cipher

**Explanation:**

The Diffie Hellman cipher uses asymmetric key cryptography. It uses a pair of keys, one private and one public.

TOP Interview Coding Problems/Challenges

- Run-length encoding (find/print frequency of letters in a string)
- Sort an array of 0's, 1's and 2's in linear time complexity
- Checking Anagrams (check whether two string is anagrams or not)
- Relative sorting algorithm
- Finding subarray with given sum
- Find the level in a binary tree with given sum K
- Check whether a Binary Tree is BST (Binary Search Tree) or not
- 1[0]1 Pattern Count
- Capitalize first and last letter of each word in a line
- Print vertical sum of a binary tree
- Print Boundary Sum of a Binary Tree
- Reverse a single linked list
- Greedy Strategy to solve major algorithm problems
- Job sequencing problem
- Root to leaf Path Sum
- Exit Point in a Matrix
- Find length of loop in a linked list
- Toppers of Class
- Print All Nodes that don't have Sibling
- Transform to Sum Tree
- Shortest Source to Destination Path

Comments and Discussions

**Ad:**
Are you a blogger? Join our Blogging forum.