0% found this document useful (0 votes)
182 views

MVJ College of Engineering: Department of Computer Science and Engineering Academic Year 2018-19 Even Assignment-2

The document is an assignment sheet from MVJ College of Engineering for the subject Cryptography under the Department of Computer Science and Engineering for the academic year 2018-19. It contains 25 multiple choice questions related to cryptography topics like encryption algorithms, ciphers, protocols and network security concepts. The questions cover topics on Vigenere cipher, RSA, DES, MD5, IPSec, SSL, PGP, VPNs, Diffie-Hellman key exchange and AES.

Uploaded by

ashwini
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
182 views

MVJ College of Engineering: Department of Computer Science and Engineering Academic Year 2018-19 Even Assignment-2

The document is an assignment sheet from MVJ College of Engineering for the subject Cryptography under the Department of Computer Science and Engineering for the academic year 2018-19. It contains 25 multiple choice questions related to cryptography topics like encryption algorithms, ciphers, protocols and network security concepts. The questions cover topics on Vigenere cipher, RSA, DES, MD5, IPSec, SSL, PGP, VPNs, Diffie-Hellman key exchange and AES.

Uploaded by

ashwini
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

MVJ COLLEGE OF ENGINEERING

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


ACADEMIC YEAR 2018-19 EVEN

Assignment-2

CRYPTOGRAPHY
SUBJECT SUBJECT NETWORK
SEMESTER 6 15CS61
CODE NAME SECURITY AND
CYBER LAWS

SL MCQ QUESTIONS CO PO
NO LEVEL LEVEL

1 On Encrypting “thepepsiisintherefrigerator”using Vignere Cipher System


using the keyword “HUMOR” we get cipher text.

a. abqdnwewuwjphfvrrtrfznsdokvl

b. abqdvmwuwjphfvvyyrfznydokvl
c. tbqyrvmwuwjphfvvyyrfznydokvl
d. baiuvmwuwjphfoeiyrfznydokvl

2 The plain text for the cipher text RRLMWBKASPDH.

Given the encryption key [(17 17 5 | 21 18 21 | 2 2 19)] is –


a. PAYMOREMONEY
b. PAYINGRANSOM
c. GETINTHECAB

d. THEEXPRESSID

3 In DES algorithm the Round Input is 32 bits, which is expanded to 48


bits via ______________
a. Scaling of the existing bits
b. Duplication of the existing bits

c. Addition of zeros
d. Addition of ones

4 A substitution cipher substitutes one symbol with

a. Keys
b. Others
c. Multi Parties
d. Single Party

5 We We use Cryptography term to transforming messages to make them secure


and immune to

a. Change
b. Idle
c. Attacks
d. Defend

6 T The man-in-the-middle attack can endanger the security of the


Diffie-Hellman method if two parties are not
a. Authenticated
b. Joined
c. Submit

d. Separate

7 The substitutional cipers are


a. Monoalphabatic
b. Sami alphabetic
c. polyalphabetic
d. both a and c

8 For RSA to work, the value of P must be less than the value of
a. P b. q c. n d. e
9 The MD5 is a message digest algorithm developed by ______.
a. Ron Rivest.

b. WhiteField Diffie.
c. Martin Hellman.
d. Diffie-Hellman.

10 IKE creates SAs for _____. A)SSL B)PGP C)IPSec D)VP

11 ______ provides either authentication or encryption, or both, for packets


at the IP level. A)AH B)ESP C)PGP D)SSL

12 One security protocol for the e-mail system is _________. A. IPSec


B)SSL C)PGP D)none of the above

13 IPSec defines two protocols: _______ and ________.


A) AH; SSL B) PGP; ESP C) AH; ESP D) all of the above

14 A modern cipher is usually a complex _____cipher made of a


combination of different simple ciphers.
A)round B)circle C)square D)none of the above

15 ______ is the protocol designed to create security associations, both


inbound and outbound. A)SA B)CA C)KDC D)IKE

16 The Internet authorities have reserved addresses for _______.


A)intranets B)internets C)extranets D)none of the above

17 An _________ is a network that allows authorized access from outside


users. A)intranet B)internet C)extranet D)none of the above

18 _________ is a collection of protocols designed by the IETF (Internet


Engineering Task Force) to provide security for a packet at the network
level. A)IPSec B)SSL C)PGP D)none of the above

19 In ______, there is a single path from the fully trusted authority to any
certificate.
A)X509 B)PGP C)KDC D)none of the above

20 A ______ provides privacy for LANs that must communicate through the
global Internet. A)VPP B)VNP C)VNN D)VPN

21 IPSec in the ______ mode does not protect the IP header.


A)transport B)tunnel C)either (a) or (b) D)neither (a) nor (b)

22 A _______ layer security protocol provides end-to-end security services


for applications.
A)data link B)network C)transport D)none of the above
23 The ________ method provides a one-time session key for two parties.
A)Diffie-Hellman B)RSA C)DES D)AES

24 AES has _____ different configurations.


A)two B)three C)four D)five

25 DES uses a key generator to generate sixteen _______ round keys.


A)32-bit B)48-bit C)54-bit D)42-bit

You might also like