
Cryptography CYS 1
Authored by Udhayakumar Shanmugam
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This is an electro-mechanical device used by British cryptologists to help decipher encrypted secret messages during World War
Bombe machine
Enigma machine
Lorenz ciphers machine
Turing Machine
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Substitution cipher is a type of .............
Symmetric key Encryption
Asymmetric key Encryption
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
High-throughput applications and Wireless communications uses........................................
Stream Ciphers
Block Ciphers
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the NOT correct example encryption algorithm
AES--> Symmetric Encryption
RSA --> Asymmetric Encryption
DES--> Symmetric Encryption
Diffie Hellman --> Asymmetric Encryption
3DES--> Symmetric Encryption
ECC --> Asymmetric Encryption
Diffie Hellman--> Symmetric Encryption
RC4 --> Asymmetric Encryption
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Plain text : STOP GLOBAL WARMING
Cipher text : RSNO FKNAZK VZQLHMF
What is the Key if the plain text is encrypted using caeser cipher
1
2
23
20
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Decode the Rail fence cipher
ATBAN5MIAYENTO22RCRI0
key height is 3
(a)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Plain text: cryptography
identify the key size if the cipher text is: CPGPRTRHYOAY
3
5
4
2
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?