
DES & AES in Cryptography
Authored by Navedha AP-CSE
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the ShiftRows step in AES?
Substitution
Permutation to provide diffusion
XOR operation with the key
Key expansion
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which AES operation is responsible for confusion?
AddRoundKey
MixColumns
SubBytes
ShiftRows
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which mode of AES is used for secure communication over networks?
ECB (Electronic Codebook)
CBC (Cipher Block Chaining)
CFB (Cipher Feedback)
OFB (Output Feedback)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a valid AES key size?
128-bit
192-bit
256-bit
512-bit
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In AES, the AddRoundKey step involves which operation?
XOR with the round key
Bitwise AND with the key
Multiplication in Galois field
Circular shifting
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack is DES most vulnerable to due to its short key length?
Brute force attack
Side-channel attack
Man-in-the-middle attack
Frequency analysis
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the initial permutation (IP) in DES?
Strengthen encryption
Introduce non-linearity
Rearrange bits for diffusion
Expand the key size
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?