Practice_Exam Flashcards
It is said that DES permutations do not add to security, but just increase brute-force attack time. This is because
a. The initial and final permutations are inverses of each other.
b. Permutations are derived from a subset of the keys.
c. Permutations are not derived from keys – they are fixed.
d. The permutations are performed in each round.
C
A permutation and its inverse are the same. The permutation must be
a. (4, 3, 2, 1)
b. (1, 2, 3, 4)
c. Both (a) and (b)
d. Neither (a) nor (b)
C
One advantage of electronic code book over cipher block chaining is
a. It is more secure
b. It uses less number of keys
c. Blocks can be encrypted in parallel
C
What is the correct form of representing 76 mod 13?
a. (72 mod 13)(73 mod 13)
b. (72 mod 13)(72 mod 13)(72 mod 13)
c. ((72 mod 13)(73 mod 13)) mod 13
d. ((72 mod 13)(72 mod 13)(72 mod 13)) mod 13
D
What is/are the security goals attainable by digital signatures?
a. Integrity
b. Authentication
c. Access Control
d. Integrity and Authentication
D
What is the advantage of private key encryption over public key encryption?
a. Provides integrity and authentication
b. Uses less number of keys in a group communication scenario
c. Can be implemented in software
d. Faster than public key encryption
D
In a three-way handshake key exchange, the following is true:
a. The server authenticates the client, but not vice versa.
b. The client authenticates the server, but not vice versa.
c. The client and the server both authenticate each other.
d. The client and the server do not authenticate each other.
D
What is the most significant feature of the Diffie Hellman exchange?
a. Fast key exchange
b. Easy to implement
c. Key exchange among a group of nodes
d. Keys are never exchanged, but are generated
D
A digital signature is produced by the following procedure:
a. Hash the message M and encrypt it with sender’s public key
b. Hash the message M and encrypt it with sender’s private key
c. Hash the message M and encrypt it with recipient’s public key
d. Hash the message M and encrypt it with recipient’s private key
B
The protocol used for authentication in WiFi Protected Access Version 1 (WPA1) is
a. TKIP
b. WEP encapsulation
c. IEEE 802.1x
d. CCMP
C
The least number of messages required for a Diffie Hellman exchange between two parties is
a. One
b. Two
c. Three
d. Four
B
You can get back a message M with the following procedure
a. Encrypt M with Alice’s public key and decrypt it with Alice’s private key
b. Encrypt M with Bob’s private key and decrypt it with Bob’s public key
c. Encrypt M with Bob’s public key and decrypt it with Alice’s private key
d. Either (a) and (b)
e. Either (b) and (c)
D
One of the advantages of stream ciphers over block ciphers is
a. It is much more secure
b. The standards are well-defined c. Errors do not propagate
d. It is more scalable
C
What is the total number of keys required if private key cryptography is used? Instead of 5 nodes, if the number of nodes is n, what is the total number of keys required with private key cryptography?
n(n-1)/2
What is the total number of keys required if public key cryptography is used? Instead of 5 nodes, if the number of nodes is n, what is the total number of keys required with public key cryptography?
2n