DES & AES in Cryptography

DES & AES in Cryptography

University

10 Qs

quiz-placeholder

Similar activities

VITAP Quiz-1

VITAP Quiz-1

University

10 Qs

SAN Module 4 Quiz

SAN Module 4 Quiz

University

15 Qs

WN-CELLULAR CONCEPT

WN-CELLULAR CONCEPT

University

10 Qs

Firewall and Network Security

Firewall and Network Security

University

15 Qs

Week 4

Week 4

University

15 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Software Engineering :TEST 2

Software Engineering :TEST 2

University

10 Qs

ADVACOMT-Quiz No.1 (final term)

ADVACOMT-Quiz No.1 (final term)

University

15 Qs

DES & AES in Cryptography

DES & AES in Cryptography

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Navedha AP-CSE

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the ShiftRows step in AES?

Substitution

Permutation to provide diffusion

XOR operation with the key

Key expansion

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which AES operation is responsible for confusion?

AddRoundKey

MixColumns

SubBytes

ShiftRows

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mode of AES is used for secure communication over networks?

ECB (Electronic Codebook)

CBC (Cipher Block Chaining)

CFB (Cipher Feedback)

OFB (Output Feedback)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a valid AES key size?

128-bit

192-bit

256-bit

512-bit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In AES, the AddRoundKey step involves which operation?

XOR with the round key

Bitwise AND with the key

Multiplication in Galois field

Circular shifting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack is DES most vulnerable to due to its short key length?

Brute force attack

Side-channel attack

Man-in-the-middle attack

Frequency analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the initial permutation (IP) in DES?

Strengthen encryption

Introduce non-linearity

Rearrange bits for diffusion

Expand the key size

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?