Search Header Logo

DES & AES in Cryptography

Authored by Navedha AP-CSE

Computers

University

Used 3+ times

DES & AES in Cryptography
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the ShiftRows step in AES?

Substitution

Permutation to provide diffusion

XOR operation with the key

Key expansion

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which AES operation is responsible for confusion?

AddRoundKey

MixColumns

SubBytes

ShiftRows

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mode of AES is used for secure communication over networks?

ECB (Electronic Codebook)

CBC (Cipher Block Chaining)

CFB (Cipher Feedback)

OFB (Output Feedback)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a valid AES key size?

128-bit

192-bit

256-bit

512-bit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In AES, the AddRoundKey step involves which operation?

XOR with the round key

Bitwise AND with the key

Multiplication in Galois field

Circular shifting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack is DES most vulnerable to due to its short key length?

Brute force attack

Side-channel attack

Man-in-the-middle attack

Frequency analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the initial permutation (IP) in DES?

Strengthen encryption

Introduce non-linearity

Rearrange bits for diffusion

Expand the key size

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?