DES & AES in Cryptography

DES & AES in Cryptography

University

10 Qs

quiz-placeholder

Similar activities

Segurança em Redes Sem Fio

Segurança em Redes Sem Fio

1st Grade - Professional Development

10 Qs

Netw2-Quiz No.2 (final term) II-BINS

Netw2-Quiz No.2 (final term) II-BINS

University

15 Qs

AES Algorithm

AES Algorithm

University

10 Qs

ITBP301_Chapter 04

ITBP301_Chapter 04

University

10 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

AES Quiz

AES Quiz

University

9 Qs

Cyber Security

Cyber Security

9th Grade - University

14 Qs

KemananData

KemananData

University

10 Qs

DES & AES in Cryptography

DES & AES in Cryptography

Assessment

Quiz

Computers

University

Medium

Created by

Navedha AP-CSE

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the ShiftRows step in AES?

Substitution

Permutation to provide diffusion

XOR operation with the key

Key expansion

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which AES operation is responsible for confusion?

AddRoundKey

MixColumns

SubBytes

ShiftRows

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mode of AES is used for secure communication over networks?

ECB (Electronic Codebook)

CBC (Cipher Block Chaining)

CFB (Cipher Feedback)

OFB (Output Feedback)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a valid AES key size?

128-bit

192-bit

256-bit

512-bit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In AES, the AddRoundKey step involves which operation?

XOR with the round key

Bitwise AND with the key

Multiplication in Galois field

Circular shifting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack is DES most vulnerable to due to its short key length?

Brute force attack

Side-channel attack

Man-in-the-middle attack

Frequency analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the initial permutation (IP) in DES?

Strengthen encryption

Introduce non-linearity

Rearrange bits for diffusion

Expand the key size

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?