Public Key Cryptosystems

Question 1
Marks : +2 | -2
Pass Ratio : 100%
Which are called the block ciphers?
IDEA
CAST
Triple-DES
All of the mentioned
Explanation:
Some of the examples of block codes are triple-DES, CAST and IDEA.
Question 2
Marks : +2 | -2
Pass Ratio : 100%
Pretty good privacy program is used for
Electronic mails
File encryption
Electronic mails & File encryption
None of the mentioned
Explanation:
Pretty good privacy (PGP) privacy program is used for both electronic mails and file encryption.
Question 3
Marks : +2 | -2
Pass Ratio : 100%
Cipher system can be solved effectively by statistically using
Time of occurrence
Frequency of occurrence
Length of the message
None of the mentioned
Explanation:
By statistically using the frequency of occurrence of individual characters and character combinations we can solve many cipher systems.
Question 4
Marks : +2 | -2
Pass Ratio : 100%
Which algorithm can be used to sign a message?
Public key algorithm
Private key algorithm
Public & Private key algorithm
None of the mentioned
Explanation:
Public key algorithms are used to sign a message and private key algorithms are used to encrypt the messages.
Question 5
Marks : +2 | -2
Pass Ratio : 100%
In transposition, the plaintext letters are
Substituted
Rearranged
Removed
None of the mentioned
Explanation:
In permutation or transposition, the positions of the plaintext letters in the message are simply rearranged.
Question 6
Marks : +2 | -2
Pass Ratio : 100%
PGP system uses
Private key system
Public key system
Private & Public key system
None of the mentioned
Explanation:
Pretty good privacy system uses both private key and public key based systems.
Question 7
Marks : +2 | -2
Pass Ratio : 100%
Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption.
Messages, session key
Session key, messages
Can be used for both
None of the mentioned
Explanation:
Private key algorithm is used for encryption of messages and public key algorithm is used for encryption of session keys.
Question 8
Marks : +2 | -2
Pass Ratio : 100%
In stream encryption, the key sequence repeats itself.
True
False
Explanation:
In stream encryption, random key-stream is used. The key sequence never repeats.
Question 9
Marks : +2 | -2
Pass Ratio : 100%
In which method, key-stream is generated independently?
Synchronous
Self synchronous
Synchronous & Self synchronous
None of the mentioned
Explanation:
In synchronous encryption system, the key-stream is generated independently of the message.
Question 10
Marks : +2 | -2
Pass Ratio : 100%
In public key cryptosystem which is kept as public?
Encryption keys
Decryption keys
Encryption & Decryption keys
None of the mentioned
Explanation:
In public key cryptosystem, the encryption keys are kept as public where as decryption keys are kept as secret.