Public Key Cryptosystems

Question 1
Marks : +2 | -2
Pass Ratio : 100%
Cipher system can be solved effectively by statistically using
Time of occurrence
Frequency of occurrence
Length of the message
None of the mentioned
Explanation:
By statistically using the frequency of occurrence of individual characters and character combinations we can solve many cipher systems.
Question 2
Marks : +2 | -2
Pass Ratio : 100%
Encryption transformations are known as
Diffusion
Confusion
Diffusion & Confusion
None of the mentioned
Explanation:
The encryption transformations were termed confusion and diffusion by Shannon.
Question 3
Marks : +2 | -2
Pass Ratio : 100%
Which has a key length of 128 bits?
IDEA
Triple-DES
IDEA & Triple-DES
None of the mentioned
Explanation:
Triple-DES uses 168 bit key size and IDEA and CAST uses 128 bits key length.
Question 4
Marks : +2 | -2
Pass Ratio : 100%
Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption.
Messages, session key
Session key, messages
Can be used for both
None of the mentioned
Explanation:
Private key algorithm is used for encryption of messages and public key algorithm is used for encryption of session keys.
Question 5
Marks : +2 | -2
Pass Ratio : 100%
Synchronous ciphers uses
Confusion
Diffusion
Confusion & Diffusion
None of the mentioned
Explanation:
Synchronous cipher system is designed to use confusion and not diffusion.
Question 6
Marks : +2 | -2
Pass Ratio : 100%
For n input bits the number of substitution patterns are
2n
(2n)!
1/2n!
2n!
Explanation:
For n input bits the total number of possible substitution or connection patterns are (2n)!.
Question 7
Marks : +2 | -2
Pass Ratio : 100%
Examples of hash functions are
MD5
SHA-1
MD5 & SHA-1
None of the mentioned
Explanation:
Some examples of hash functions are MD5 and SHA-1.
Question 8
Marks : +2 | -2
Pass Ratio : 100%
Public key cryptosystem uses same key for both encryption and decryption.
True
False
Explanation:
Public key cryptosystem uses different keys for encryption and decryption.
Question 9
Marks : +2 | -2
Pass Ratio : 100%
In public key cryptosystem _____ keys are used for encryption and decryption.
Same
Different
Encryption Keys
None of the mentioned
Explanation:
In conventional cryptosystem, same keys are used for encryption and decryption where as in public key cryptosystem different keys are used.
Question 10
Marks : +2 | -2
Pass Ratio : 100%
Pretty good privacy program is used for
Electronic mails
File encryption
Electronic mails & File encryption
None of the mentioned
Explanation:
Pretty good privacy (PGP) privacy program is used for both electronic mails and file encryption.