Documente Academic
Documente Profesional
Documente Cultură
a) Authentication
b) Identification
c) Validation
d) Verification
a) Entities
b) Data
c) Problems
d) Translator
C
4. DES follows
a) Hash Algorithm
b) Caesars Cipher
c) Feistel Cipher Structure
d) SP Networks
C
5. The DES Algorithm Cipher System consists of ____________rounds (iterations) each with a
round key
a) 12
b) 18
c) 9
d) 16
C
7. What is 11 mod 7 and -11 mod 7?
a) 4 and 5
b) 4 and 4
c) 5 and 3
d) 4 and -4
9. 117 mod 13 =
a) 3
b) 7
c) 5
d) 15
D
11. AES uses a ____________ bit block size and a key size of __________ bits.
a) 128; 128 or 256
b) 64; 128 or 192
c) 256; 128, 192, or 256
d) 128; 128, 192, or 256
D
12. The 4×4 byte matrices in the AES algorithm are called
a) States
b) Words
c) Transitions
d) Permutations
A
13. Find the solution of x2≡ 3 mod 11
a) x ≡ -9 mod 11 and x≡ 9 mod 11
b) x ≡ 9 mod 11
c) No Solution
d) x ≡ 5 mod 11 and x ≡ 6 mod 11
D
15. ᶲ(35)=
a) 24
b) 25
c) 22
d) 18
A
16. What is the Discrete logarithm to the base 10 (mod 19) for a =7?
a) 12
b) 14
c) 8
d) 11
A
18. Six teachers begin courses on Monday Tuesday Wednesday Thursday Friday and Saturday,
respectively, and announce their intentions of lecturing at intervals of 2,3,4,1,6 and 5 days
respectively. Sunday lectures are forbidden. When first will all the teachers feel compelled to
omit a lecture?
a) 354
b) 371
c) 432
d) 213
B
19. How many primitive roots are there for 25?
a) 4
b) 5
c) 7
d) 8
D
20. For p = 11 and q = 17 and choose e=7. Apply RSA algorithm where PT message=88 and thus find
the CT.
a) 23
b) 64
c) 11
d) 54
C
23. In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the
property of ‘p’ and ‘q’?
a) p and q should be divisible by Ф(n)
b) p and q should be co-prime
c) p and q should be prime
d) p/q should give no remainder
26. In SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
a) 1024
b) 512
c) 256
d) 1248
A
28. What is the size of W (in bits) in the SHA-512 processing of a single 1024- bit block?
a) 64
b) 128
c) 512
d) 256
A
29. The output of the N 1024-bit blocks from the Nth stage is
a) 512 bits
b) 1024 bits
c) N x 1024bits
d) N x 512 bits
A
30. Message authentication code is also known as
a) key code
b) hash code
c) keyed hash function
d) message key hash function
C
31. What is the value of ipad in the HMAC structure?
a) 00111110
b) 00110010
c) 10110110
d) 01110110
B
34. For an m-bit value, the adversary would have to try ____________ values to generates a given
hash value h.
a) 2m
b) 2(m-1)
c) 2(m/2)
d) (2m) – 1
B