Public Key Cryptosystems

Question 1
Marks : +2 | -2
Pass Ratio : 100%
For n input bits the number of substitution patterns are
2n
(2n)!
1/2n!
2n!
Explanation:
For n input bits the total number of possible substitution or connection patterns are (2n)!.
Question 2
Marks : +2 | -2
Pass Ratio : 100%
Synchronous ciphers uses
Confusion
Diffusion
Confusion & Diffusion
None of the mentioned
Explanation:
Synchronous cipher system is designed to use confusion and not diffusion.
Question 3
Marks : +2 | -2
Pass Ratio : 100%
Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption.
Messages, session key
Session key, messages
Can be used for both
None of the mentioned
Explanation:
Private key algorithm is used for encryption of messages and public key algorithm is used for encryption of session keys.
Question 4
Marks : +2 | -2
Pass Ratio : 100%
Examples of hash functions are
MD5
SHA-1
MD5 & SHA-1
None of the mentioned
Explanation:
Some examples of hash functions are MD5 and SHA-1.
Question 5
Marks : +2 | -2
Pass Ratio : 100%
In stream encryption, the key sequence repeats itself.
True
False
Explanation:
In stream encryption, random key-stream is used. The key sequence never repeats.
Question 6
Marks : +2 | -2
Pass Ratio : 100%
Which are called the block ciphers?
IDEA
CAST
Triple-DES
All of the mentioned
Explanation:
Some of the examples of block codes are triple-DES, CAST and IDEA.
Question 7
Marks : +2 | -2
Pass Ratio : 100%
PGP system uses
Private key system
Public key system
Private & Public key system
None of the mentioned
Explanation:
Pretty good privacy system uses both private key and public key based systems.
Question 8
Marks : +2 | -2
Pass Ratio : 100%
In cipher feedback method, encryption is done on
Single individual bits
Characters
Single individual bits & Characters
None of the mentioned
Explanation:
In cipher feedback method, single individual bits are encrypted rather than characters and this leads to stream encryption.
Question 9
Marks : +2 | -2
Pass Ratio : 100%
In transposition, the plaintext letters are
Substituted
Rearranged
Removed
None of the mentioned
Explanation:
In permutation or transposition, the positions of the plaintext letters in the message are simply rearranged.
Question 10
Marks : +2 | -2
Pass Ratio : 100%
In a trapdoor function, the functions are easy to go in
One direction
Two directions
All directions
None of the mentioned
Explanation:
A trapdoor is a one way function. Such functions can go easily in only one direction.