UNIT 2 DES,BLOCK CIPHER

UNIT 2 DES,BLOCK CIPHER

University - Professional Development

20 Qs

quiz-placeholder

Similar activities

SSL/TLS

SSL/TLS

University

20 Qs

SEC+ Ch.10 Review Test

SEC+ Ch.10 Review Test

Professional Development

15 Qs

CPU scheduling

CPU scheduling

Professional Development

16 Qs

Pigpen Cipher

Pigpen Cipher

12th Grade - University

15 Qs

DECI - Week 7 - round

DECI - Week 7 - round

Professional Development

17 Qs

Algorithms and Flowchart

Algorithms and Flowchart

University

20 Qs

Cryptography

Cryptography

University - Professional Development

20 Qs

Cyber Security

Cyber Security

University

23 Qs

UNIT 2 DES,BLOCK CIPHER

UNIT 2 DES,BLOCK CIPHER

Assessment

Quiz

Computers

University - Professional Development

Hard

Created by

Saranya Raja

Used 32+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a mode of operation for the Block ciphers in cryptography?

Electronic Code Book (ECB)

Cipher Block Chaining (CBC)

Counter (CTR) mode

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For which of the following should EBC (Electronic Code Book) process not be used for encryption?

For large block sizes

For fixed block sizes

For small block sizes

none of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?

CBC is a mode of operation for stream ciphers.

Initialization vector (IV) is used in CBC in the initial phase.

It has better resistive nature towards cryptanalysis than ECB

None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?

CBC

ECB

CFB

ALL THE ABOVE

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Encryption Standard (DES) is a __________.

Stream Cipher

Bit Cipher

Block Cipher

Substitution Cipher

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The S-Box is used to provide confusion, as it is dependent on the unknown key.

true

false

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

This is an example of

SP Networks

Feistel Cipher

Hash Algorithm

Hill Cipher

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?