DES & AES in Cryptography

DES & AES in Cryptography

University

10 Qs

quiz-placeholder

Similar activities

Computer Science (1-9) - Identifying & Preventing Threats

Computer Science (1-9) - Identifying & Preventing Threats

University

11 Qs

Computer Science: CPU performance

Computer Science: CPU performance

University

13 Qs

Recording Software Button Identification Quiz

Recording Software Button Identification Quiz

8th Grade - University

10 Qs

Computer Hardware foundation degree 1

Computer Hardware foundation degree 1

University

12 Qs

Round 2 for Preplacement Bootcamp

Round 2 for Preplacement Bootcamp

University

15 Qs

Evaluasi UTS Basis Data

Evaluasi UTS Basis Data

University

15 Qs

Operating System - Chapter 1-1

Operating System - Chapter 1-1

University

10 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

DES & AES in Cryptography

DES & AES in Cryptography

Assessment

Quiz

Computers

University

Medium

Created by

Navedha AP-CSE

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the ShiftRows step in AES?

Substitution

Permutation to provide diffusion

XOR operation with the key

Key expansion

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which AES operation is responsible for confusion?

AddRoundKey

MixColumns

SubBytes

ShiftRows

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mode of AES is used for secure communication over networks?

ECB (Electronic Codebook)

CBC (Cipher Block Chaining)

CFB (Cipher Feedback)

OFB (Output Feedback)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a valid AES key size?

128-bit

192-bit

256-bit

512-bit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In AES, the AddRoundKey step involves which operation?

XOR with the round key

Bitwise AND with the key

Multiplication in Galois field

Circular shifting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack is DES most vulnerable to due to its short key length?

Brute force attack

Side-channel attack

Man-in-the-middle attack

Frequency analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the initial permutation (IP) in DES?

Strengthen encryption

Introduce non-linearity

Rearrange bits for diffusion

Expand the key size

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?