UNIT 2 DES,BLOCK CIPHER

UNIT 2 DES,BLOCK CIPHER

University - Professional Development

20 Qs

quiz-placeholder

Similar activities

Data Security (Quiz3)

Data Security (Quiz3)

University - Professional Development

18 Qs

IAS CH5 QUIZ

IAS CH5 QUIZ

University

25 Qs

Cryptography

Cryptography

University

15 Qs

CS Quiz Test 2

CS Quiz Test 2

Professional Development

25 Qs

BSA - Elec - Finals

BSA - Elec - Finals

University

20 Qs

Cyber Security

Cyber Security

University

23 Qs

SSL/TLS

SSL/TLS

University

20 Qs

Python Files

Python Files

University

20 Qs

UNIT 2 DES,BLOCK CIPHER

UNIT 2 DES,BLOCK CIPHER

Assessment

Quiz

Computers

University - Professional Development

Hard

Created by

Saranya Raja

Used 32+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a mode of operation for the Block ciphers in cryptography?

Electronic Code Book (ECB)

Cipher Block Chaining (CBC)

Counter (CTR) mode

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For which of the following should EBC (Electronic Code Book) process not be used for encryption?

For large block sizes

For fixed block sizes

For small block sizes

none of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?

CBC is a mode of operation for stream ciphers.

Initialization vector (IV) is used in CBC in the initial phase.

It has better resistive nature towards cryptanalysis than ECB

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?

CBC

ECB

CFB

ALL THE ABOVE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Encryption Standard (DES) is a __________.

Stream Cipher

Bit Cipher

Block Cipher

Substitution Cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The S-Box is used to provide confusion, as it is dependent on the unknown key.

true

false

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

This is an example of

SP Networks

Feistel Cipher

Hash Algorithm

Hill Cipher

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?