Classical Cryptography 3

Classical Cryptography 3

University

8 Qs

quiz-placeholder

Similar activities

Visual Basic 2010

Visual Basic 2010

8th Grade - University

10 Qs

CS100||MsWord

CS100||MsWord

University

10 Qs

Types of Mass Media

Types of Mass Media

10th Grade - Professional Development

11 Qs

Website Usability and UX

Website Usability and UX

University

10 Qs

Python Week 1 & 2

Python Week 1 & 2

University

10 Qs

Quiz 1: The background and history of IoT

Quiz 1: The background and history of IoT

University

10 Qs

ADVERTISEMENT PRODUCTION & AGENCY (W10 - W12)

ADVERTISEMENT PRODUCTION & AGENCY (W10 - W12)

University

10 Qs

Hands-on Modul 3

Hands-on Modul 3

University

10 Qs

Classical Cryptography 3

Classical Cryptography 3

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Udhayakumar Shanmugam

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following equation is correct to find the inverse of the key matrix for Hill Cipher Decryption

where K is the key matrix,

d is the determinant of the key matrix

Media Image
Media Image
Media Image
Media Image

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For One time Pad Which of these are Not a Mandatory rule

The OTP should consist of Truely random characters (noise).

The OTP (i.e. the key) should have the same length as the plaintext (or longer).

Only two copies of the OTP should exist.

The OTP should be used only Twice.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a number is divided by several other numbers that have no common factors, one can find the remainder when dividing by the product of those numbers.

Chinese Remainder Theorem

Rule for One time Pad

Fast modular exponentiation theorem

LFSR theorem

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

=

Media Image
Media Image
Media Image

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT the Sub Components of an LFSR

Shift Register

Linear Feedback

Taps

Clock

Pseudo Random Generator

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which mode does this Block cipher represent

Cipher Block Chaining

Electronic Code Book

Cipher Feedback Mode

Output Feedback Mode

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

......................................................... is a non-secret, unique value used to ensure that encrypting the same plaintext with the same key results in different ciphertexts

Initialization Vector

Seed Vector

Modulation Vector

Decryption Vector

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?