Public Key Cryptosystems

Question 1
Marks : +2 | -2
Pass Ratio : 100%
In a trapdoor function, the functions are easy to go in
One direction
Two directions
All directions
None of the mentioned
Explanation:
A trapdoor is a one way function. Such functions can go easily in only one direction.
Question 2
Marks : +2 | -2
Pass Ratio : 100%
Synchronous ciphers uses
Confusion
Diffusion
Confusion & Diffusion
None of the mentioned
Explanation:
Synchronous cipher system is designed to use confusion and not diffusion.
Question 3
Marks : +2 | -2
Pass Ratio : 100%
In public key cryptosystem which is kept as public?
Encryption keys
Decryption keys
Encryption & Decryption keys
None of the mentioned
Explanation:
In public key cryptosystem, the encryption keys are kept as public where as decryption keys are kept as secret.
Question 4
Marks : +2 | -2
Pass Ratio : 100%
Examples of hash functions are
MD5
SHA-1
MD5 & SHA-1
None of the mentioned
Explanation:
Some examples of hash functions are MD5 and SHA-1.
Question 5
Marks : +2 | -2
Pass Ratio : 100%
In public key cryptosystem _____ keys are used for encryption and decryption.
Same
Different
Encryption Keys
None of the mentioned
Explanation:
In conventional cryptosystem, same keys are used for encryption and decryption where as in public key cryptosystem different keys are used.
Question 6
Marks : +2 | -2
Pass Ratio : 100%
PGP system uses
Private key system
Public key system
Private & Public key system
None of the mentioned
Explanation:
Pretty good privacy system uses both private key and public key based systems.
Question 7
Marks : +2 | -2
Pass Ratio : 100%
In cipher feedback method, encryption is done on
Single individual bits
Characters
Single individual bits & Characters
None of the mentioned
Explanation:
In cipher feedback method, single individual bits are encrypted rather than characters and this leads to stream encryption.
Question 8
Marks : +2 | -2
Pass Ratio : 100%
Cipher system can be solved effectively by statistically using
Time of occurrence
Frequency of occurrence
Length of the message
None of the mentioned
Explanation:
By statistically using the frequency of occurrence of individual characters and character combinations we can solve many cipher systems.
Question 9
Marks : +2 | -2
Pass Ratio : 100%
Which algorithm can be used to sign a message?
Public key algorithm
Private key algorithm
Public & Private key algorithm
None of the mentioned
Explanation:
Public key algorithms are used to sign a message and private key algorithms are used to encrypt the messages.
Question 10
Marks : +2 | -2
Pass Ratio : 100%
Public key cryptosystem uses same key for both encryption and decryption.
True
False
Explanation:
Public key cryptosystem uses different keys for encryption and decryption.