Question 1 |

Avalanche effect in cryptography refers

Large changes in cipher text when the keyword is changed minimally | |

Large changes in cipher text when the plain text is changed | |

Large Impact of keyword change to length of the cipher text | |

None of the above |

Question 1 Explanation:

Question 2 |

In a columnar transportation cipher, the plain text is "the tomato is a plant in the night shade family", keyword is "TOMATO". The cipher text is

"TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX" | |

"TINESAX / EOAHTFX / MAIIAIX / HTLTHEY / TAPNGDL / OSTNHMX" | |

"TINESAX / EOAHTFX / HTLTHEY / MAIIAIX / OSTNHMX / TAPNGDL" | |

"EOAHTFX / TINESAX / HTLTHEY / MAIIAIX / TAPNGDL / OSTNHMX" |

Question 2 Explanation:

Question 3 |

In an RSA cryptosystem, the value of the public modulus parameter n is 3007. If it is also is known that \phi(n)=2880, where \phi() denotes Euler's Totient Function, then the prime factors of n which is greater than 50 is _________ .

71 | |

83 | |

97 | |

91 |

Question 3 Explanation:

Question 4 |

Which one of the following algorithm is not used in asymmetric key cryptography?

RSA Algorithm | |

Gillie-Hellman Algorithm | |

Electronic Code Book Algorithm | |

None of the above |

Question 4 Explanation:

Question 5 |

What is one advantage of setting up a DMZ (Demilitarized Zone) with two firewalls?

You can control where traffic goes in the three networks | |

You can do statefull packet filtering | |

You can do load balancing | |

Improve network performance |

Question 5 Explanation:

Question 6 |

Avalanche effect in cryptography

Is desirable property of cryptographic algorithm | |

Is undesirable property of cryptographic algorithm | |

Has no effect on encryption algorithm | |

None of the above |

Question 6 Explanation:

Question 7 |

In cryptography, the following uses transposition ciphers and the keyword is LAYER. Encrypt the following message. (Spaces are omitted during encrypton)

WELCOME TO NETWORK SECURITY!

WELCOME TO NETWORK SECURITY!

WMEKREETSILTWETCOOCYONRU! | |

EETSICOOCYWMEKRONRU!LTWET | |

LTWETONRU!WMEKRCOOCYEETSI | |

ONRU!COOCYLTWETEETSIWMEKR |

Question 7 Explanation:

Question 8 |

Pretty Good Privacy (PGP) is used in:

Browser security | |

FTP security | |

Email security | |

None of the above |

Question 8 Explanation:

Question 9 |

MD5 is a widely used hash function for producing hash value of

64 bits | |

128 bits | |

512 bits | |

1024 bits |

Question 9 Explanation:

Question 10 |

In a RSA cryptosystem a participant A uses two prime numbers p=13 and q=17 to generate
her public and private keys. If the public key of A is 35. Then the private key of A is
__________.

13 | |

19 | |

23 | |

11 |

Question 10 Explanation:

There are 10 questions to complete.