Search Header Logo
Untitled Presentation

Untitled Presentation

Assessment

Presentation

Social Studies

University

Practice Problem

Hard

Created by

Muthamil M.Muthamil selvi

FREE Resource

50 Slides • 27 Questions

1

media

2

media

3

Open Ended

Why is it important for the substitution in an S-box to be one-to-one in cryptographic algorithms?

4

Multiple Choice

Which of the following best describes the role of an S-box in the Substitution–Permutation Model?

1

It substitutes a small block of bits with another block of bits, ensuring invertibility.

2

It permutes all the bits in the input.

3

It generates the round key for each round.

4

It combines the output using XOR operation.

5

media

6

Multiple Choice

Which cryptographic structure is illustrated in the diagram with multiple rounds of substitution and permutation, and what is its primary purpose?

1

Substitution-Permutation Network, used for block ciphers

2

Feistel Network, used for stream ciphers

3

RSA Algorithm, used for public key encryption

4

Hash Function, used for data integrity

7

media

8

media

9

Open Ended

Explain the main difference between symmetric and asymmetric encryption, using AES as an example.

10

Multiple Choice

What are the possible key sizes and block size for the Advanced Encryption Standard (AES)?

1

Key sizes: 128, 192, or 256 bits; Block size: 128 bits

2

Key sizes: 64, 128, or 256 bits; Block size: 64 bits

3

Key sizes: 128, 192, or 256 bits; Block size: 256 bits

4

Key sizes: 192, 256, or 512 bits; Block size: 128 bits

11

media

12

Fill in the Blanks

Type answer...

13

media

14

Multiple Choice

Which steps are repeated in each round of the AES encryption process, and which step is omitted in the last round?

1

SubBytes, ShiftRows, MixColumns are repeated; MixColumns is omitted in the last round

2

AddRoundKey is repeated; SubBytes is omitted in the last round

3

ShiftRows, MixColumns are repeated; AddRoundKey is omitted in the last round

4

SubBytes, MixColumns are repeated; ShiftRows is omitted in the last round

15

media

16

Multiple Choice

What is the purpose of the SubBytes step in the AES algorithm, as shown in the diagram?

1

To provide non-linearity by substituting bytes using an S-box

2

To shift the rows of the state matrix

3

To mix the columns for diffusion

4

To add the round key to the state

17

media

18

Multiple Choice

Which step in AES involves shifting the rows of the state matrix by different offsets?

1

ShiftRows

2

MixColumns

3

AddRoundKey

4

SubBytes

19

media

20

Multiple Choice

What is the main purpose of the MixColumns step in AES encryption?

1

To permute the columns for diffusion

2

To substitute bytes for confusion

3

To add the round key to the state

4

To shift the rows for diffusion

21

media

22

Multiple Choice

In the AddRoundKey step, which operation is performed between the state and the round key?

1

Bitwise AND

2

Bitwise OR

3

Bitwise XOR

4

Addition modulo 256

23

media

24

Open Ended

Explain how the state is represented in AES and how it relates to the block size.

25

media

26

Fill in the Blanks

Type answer...

27

media

28

Multiple Select

Select all valid AES key sizes from the following options.

1

128 bits

2

160 bits

3

192 bits

4

256 bits

29

media

30

media

31

media

32

Multiple Choice

Which of the following is NOT a characteristic of symmetric key cryptography?

1

Two parties MUST trust each other

2

Both share the same key

3

Typically slower

4

Examples include RSA and ECC

33

media

34

Multiple Select

Which of the following statements about asymmetric encryption are correct?

1

It uses two keys: a public key and a private key.

2

It is typically faster than symmetric encryption.

3

It relies on number theory concepts.

4

Both parties must trust each other.

35

Fill in the Blanks

Type answer...

36

Open Ended

Explain the main differences between symmetric key and asymmetric key cryptography, and discuss scenarios where one might be preferred over the other.

37

media

38

Multiple Choice

In the context of asymmetric encryption for confidentiality, whose public key does Bob use to encrypt a message intended for Alice?

1

Bob's public key

2

Alice's public key

3

Bob's private key

4

Alice's private key

39

media

40

Open Ended

Describe the process of authentication using asymmetric encryption as shown in the diagram. What role do private and public keys play in this process?

41

media

42

Multiple Choice

Which of the following is NOT an application of asymmetric encryption?

1

Encryption/decryption

2

Digital signature

3

Key exchange

4

Symmetric key generation

43

media

44

media

45

Fill in the Blanks

Type answer...

46

media

47

Multiple Select

Which steps are involved in the process of digital signatures? Select all that apply.

1

Hashing the message

2

Signing with sender's private key

3

Encrypting with receiver's public key

4

Verifying with sender's public key

48

media

49

Open Ended

Describe the sequence of steps involved in creating and verifying a digital envelope carrying a signed message.

50

media

51

Multiple Choice

Which protocol in the SSL architecture is responsible for establishing a secure connection between client and server?

1

SSL Record Protocol

2

SSL Handshake Protocol

3

SSL Alert Protocol

4

SSL Change Cipher Spec Protocol

52

media

53

media

54

media

55

media

56

media

57

media

58

media

59

media

60

media

61

media

62

media

63

media

64

media

65

media

66

media

67

media

68

media

69

media

70

media

71

media

72

media

73

media

74

media

75

media

76

Open Ended

How do S-boxes and P-boxes work together to ensure security in the Substitution–Permutation Model?

77

Multiple Choice

What is the main function of an S-box in the Substitution–Permutation Model?

1

To substitute a small block of bits by another block of bits

2

To permute all the bits from S-boxes

3

To generate the round key

4

To perform XOR operations

media

Show answer

Auto Play

Slide 1 / 77

SLIDE