Sunteți pe pagina 1din 6

1. The process of verifying the identity of a user.

a) Authentication
b) Identification
c) Validation
d) Verification

2. CHAP stands for?


a) Challenge Handshake authentication protocol
b) Challenge Hardware authentication protocol
c) Circuit Hardware authentication protocol
d) Circuit Handshake authentication protocol

3. Confidentiality with asymmetric-key cryptosystem has its own

a) Entities
b) Data
c) Problems
d) Translator

C
4. DES follows
a) Hash Algorithm
b) Caesars Cipher
c) Feistel Cipher Structure
d) SP Networks
C
5. The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a
round key
a) 12
b) 18
c) 9
d) 16

6. Calculate the GCD of 1160718174 and 316258250 using Euclidean algorithm.


a) 882
b) 770
c) 1078
d) 1225

C
7. What is 11 mod 7 and -11 mod 7?
a) 4 and 5
b) 4 and 4
c) 5 and 3
d) 4 and -4

8. Which of the following is a valid property for concurrency?


a) a = b (mod n) if n|(a-b)
b) a = b (mod n) implies b = a (mod n)
c) a = b (mod n) and b = c (mod n) implies a = c (mod n)
d) All of the mentioned

9. 117 mod 13 =
a) 3
b) 7
c) 5
d) 15
D

10. 5/3 mod 7 =


a) 2
b) 3
c) 4
d) 5
D

11. AES uses a ____________ bit block size and a key size of __________ bits.
a) 128; 128 or 256
b) 64; 128 or 192
c) 256; 128, 192, or 256
d) 128; 128, 192, or 256
D

12. The 4×4 byte matrices in the AES algorithm are called
a) States
b) Words
c) Transitions
d) Permutations

A
13. Find the solution of x2≡ 3 mod 11
a) x ≡ -9 mod 11 and x≡ 9 mod 11
b) x ≡ 9 mod 11
c) No Solution
d) x ≡ 5 mod 11 and x ≡ 6 mod 11
D

14. Find the set of quadratic residues in the set –


Z11* = { 1, 2, 3, 4, 5, 6, 7, 8, 9, 10}
a) QR set = {1, 2, 4, 5, 9} of Z11*
b) QR set = {1, 3, 6, 5, 9} of Z11*
c) QR set = {1, 3, 4, 9,10} of Z11*
d) QR set = {1, 3, 4, 5, 9} of Z11*
D

15. ᶲ(35)=
a) 24
b) 25
c) 22
d) 18
A

16. What is the Discrete logarithm to the base 10 (mod 19) for a =7?
a) 12
b) 14
c) 8
d) 11
A

17. Find x for the CRT when x= 2 mod 3; x= 3 mod 5; x = 2 mod 7


a) 33
b) 22
c) 23
d) 31
C

18. Six teachers begin courses on Monday Tuesday Wednesday Thursday Friday and Saturday,
respectively, and announce their intentions of lecturing at intervals of 2,3,4,1,6 and 5 days
respectively. Sunday lectures are forbidden. When first will all the teachers feel compelled to
omit a lecture?
a) 354
b) 371
c) 432
d) 213
B
19. How many primitive roots are there for 25?
a) 4
b) 5
c) 7
d) 8
D

20. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find
the CT.
a) 23
b) 64
c) 11
d) 54
C

21. In Elgamal cryptosystem, given the prime p=31.


Choose e1= first primitive root of p and d=10, calculate e2.
a) 24
b) 36
c) 25
d) 62

22. In Elgamal cryptosystem, given the prime p=31.


Encrypt the message “HELLO”; use 00 to 25 for encoding. The value of C2 for character ‘L’ is
a) 12
b) 07
c) 20
d) 27

23. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the
property of ‘p’ and ‘q’?
a) p and q should be divisible by Ф(n)
b) p and q should be co-prime
c) p and q should be prime
d) p/q should give no remainder

24. In RSA, Ф(n) = _______ in terms of p and q.


a) (p)/(q)
b) (p)(q)
c) (p-1)(q-1)
d) (p+1)(q+1)

25. What is the general equation for elliptic curve systems?


a) y3+b_1 xy+b_2 y=x33+a_1 x2+a_2 x+a_3
b) y3+b_1 x+b_2 y=x2+a_1 x2+a_2 x+a_3
c) y2+b_1 xy+b_2 y=x3+a_1 x2+a_2
d) y2+b_1 xy+b_2 y=x3+a_1 x2+a_2 x+a_3

26. In SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
a) 1024
b) 512
c) 256
d) 1248
A

27. The message in SHA-512 is padded so that it’s length is


a) 832 mod 1024
b) 768 mod 1024
c) 960 mod 1024
d) 896 mod 1024
D

28. What is the size of W (in bits) in the SHA-512 processing of a single 1024- bit block?
a) 64
b) 128
c) 512
d) 256
A

29. The output of the N 1024-bit blocks from the Nth stage is
a) 512 bits
b) 1024 bits
c) N x 1024bits
d) N x 512 bits
A
30. Message authentication code is also known as
a) key code
b) hash code
c) keyed hash function
d) message key hash function
C
31. What is the value of ipad in the HMAC structure?
a) 00111110
b) 00110010
c) 10110110
d) 01110110
B

32. What is the value of opad in the HMAC structure?


a) 00111110
b) 00110010
c) 10110110
d) 01011100
D

33. In SHA-512, W16 is dependent on


a) W0,W3,W7,W13
b) W3,W7,W11,W15
c) W0,W1,W9,W14
d) W0,W1,W10,W13
C

34. For an m-bit value, the adversary would have to try ____________ values to generates a given
hash value h.
a) 2m
b) 2(m-1)
c) 2(m/2)
d) (2m) – 1
B

35. The multiplicative Inverse of 1234 mod 4321 is


a) 3239
b) 3213
c) 3242
d) Does not exist
A

S-ar putea să vă placă și