Cryptography Question & Answers December 22, 2022 By WatElectronics This article lists 100 Cryptography MCQs for engineering students. All the Cryptography Questions & Answers given below include a hint and a link wherever possible to the relevant topic. This is helpful for users who are preparing for their exams, interviews, or professionals who would like to brush up on the fundamentals of Cryptography. Cryptography is the process of communicating confidential information in an unreadable format ( encryption), between legitimate users which can be converted into a readable format ( decryption )process. The meaning of crypt means hidden to writing. Receivers and transmitters are the basic communication blocks involved in crypto communication. Cryptography intercepts unauthorized types of data accessibility. The principles of cryptography include privacy, reliability, non-repudiation, and authentication. There are 2 types of cryptography namely symmetric and asymmetric type cryptography. The symmetric-based algorithms include blowfish, block cipher, and block. Whereas asymmetric-type cryptography includes RSA, DSA, and PKCs. The tools used in cryptography include SignTool.exe, JCA, and Secure token. The applications of cryptography include digital signature, authentication, and key generation. 1). ___ is the process of communicating confidential information in an unreadable format between legitimate users? Cryptography Symmentricity Asymmenticity All the above None Hint 2). Which are the ends does cryptography process takes place? Transmitter Receiver Channel Both a and b None Hint 3). Cryptography intercepts ____ type of data accessibility? Authorized Unauthorized Legitimate All the above None Hint 4). Which of the following is the meaning of crypt? Hidden Writing Copied Both a and b None Hint 5). Which of the following subjective involves in cryptography? Mathematics Physics Chemistry Biology None Hint 6). Which of the following are the applications of cryptography? Digital signature Authentication Key generation All the above None Hint 7). Which of the following principle of cryptography explains transmitted data in air must be read by the authentic user? Privacy Reliability Non-repudiation Authentication None Hint 8). Which of the following principle of cryptography explains transmitted data in cannot be modified? Privacy Reliability Non-repudiation Authentication None Hint 9). Which of the following principle of cryptography explains transmitted data in cannot be denied from being accepted the message received? Privacy Reliability Non-repudiation Authentication None Hint 10). Which of the following stage of cryptography are the readable non-encrypted data? Plain Text Encryption Cipher text Decryption None Hint 11). Which of the following stage of cryptography are the non readable encrypted data? Plain Text Encryption Cipher text Both b and c None Hint 12). At which end encryption is performed? Transmitter Receiver Channel Both a and b None Hint 13). At which end decryption is performed? Transmitter Receiver Channel Both a and b None Hint 14). In how many ways does information in cryptography is encrypted? 2 3 4 5 None Hint 15). Which of the following are hash functions? MD5 Whirlpool SHA All the above None Hint 16). Which of the following are symmetric based algorithims? Block Block cipher Blowfish All the above None Hint 17). Which of the following is the other name of symmentric key cryptography? Private key Secret key Ideal key Both a and b None Hint 18). Which of the following are the tools used in cryptography? Secure token JCA SignTool.exe All the above None Hint 19). Which of the following tool of cryptography verifies a user? Secure token JCA SignTool.exe CertMgr.exe None Hint 20). Which of the following protocol is used in security token crypto tool? TTL HTTP HTTPS SSL None Hint 21). Security Token is ____ type of authentication? Static Dynamic Zero Both b and c None Hint 22). A token provides ____ for HTTP protocol? Stateful Stateless Zero Infinite None Hint 23). Which of the following tool of cryptography provides access to legitimate user in encryption process? Secure token JCA SignTool.exe CertMgr.exe None Hint 24). JCA tool has ______ prior to implementation? Pre-defined activities Post-defined activities Arbitary constant All the above None Hint 25). Which of the following cryptography tool assist in digital-identity of Microsoft files? Secure token JCA SignTool.exe CertMgr.exe None Hint Cryptography MCQs for Students 26). Which of the following are the features of SignTool.exe crypto-tool? Signature Time stamp Augment reliability All the above None Hint 27). Which of the following are encrypted in Docker? Information Files Message Both a and b None Hint 28). Docker has ___ model server? Shared Dedicated Private All the above None Hint 29). Which of the following tool assist in handling certificates? Secure token JCA SignTool.exe CertMgr.exe None Hint 30). Which of the following are the cryptographic algorithms? Triple DES Blowfish RSA All the above None Hint 31). How many keys does Triple DES operates with? 2 3 4 5 None Hint 32). What is the key bits value of Triple DES? 112 116 118 121 None Hint 33). Which of the following is the structure of DES? Feistel network Luby rackoff block cipher Assymentric cipher Both a and b None Hint 34). Which of the following algorithm has overcome triple DES? AES Blow fish DSA All the above None Hint 35). How much times faster does AES algo is compared to DES? 2 3 5 6 None Hint 36). An AES algo has _____ type pf block cipher? Symmetric Asymmetric Zero All the above None Hint 37). Which of the following is the bit size of AES? 128 192 256 All the above None Hint 38). 128 bits plain text form of AES has __ bytes? 12 14 16 18 None Hint 39). On which of the following term does AES performs computation? Bytes Bits Blocks Both a and b None Hint 40). How many rows of matrix does AES processes? 2 4 6 8 None Hint 41). How many columns of matrix does AES processes? 2 4 6 8 None Hint 42). How many rounds does 128 bits in AES requires? 10 20 30 40 None Hint 43). How many rounds does 192 bits in AES requires? 10 12 14 16 None Hint 44). How many rounds does 256 bits in AES requires? 10 12 14 16 None Hint 45). Which of the following is the first step of AES? Sub Bytes Shift rows Mix columns Add round keys None Hint 46). Which of the following is the second step of AES? Sub Bytes Shift rows Mix columns Add round keys None Hint 47). Which of the following is the third step of AES? Sub Bytes Shift rows Mix columns Add round keys None Hint 48). Which of the following is the fourth step of AES? Sub Bytes Shift rows Mix columns Add round keys None Hint 49). In shift row first step of AES, how much position is shifted? 0 1 2 3 None Hint 50). In shift row second step of AES, how much position is shifted? 0 1 2 3 None Hint Cryptography MCQs for Exams 51). Which of the following step in AES is ignored at n^th stage? Sub Bytes Shift rows Mix columns Add round keys None Hint 52). Which of the following are asymmetric crypto algo? RSA ECC DSA All the above None Hint 53). ___ is defined as a pair of algo which performs both encryption and decryption? Cipher Plain text Unencrypted text Both b and c None Hint 54). Which of the following term defines the string of char that assist during encryption and decryption of confidential message? Cipher Plain text Key All the above None Hint 55). Which of the following are the components of crypto system? Plain text Cipher text Keys All the above None Hint 56). Which of the following is an encryption key of assymetric system? Public Private Both a and b Zero key None Hint 57). Which of the following is an decryption key of assymetric system? Public Private Both a and b Zero key None Hint 58). Symmetric key ciphers are deployed using? Stream cipher Block cipher Bit cipher Both a and b None Hint 59). Which of the following are the applications of DES algo? ATM based encryption E-mail Remote access All the above None Hint 60). Which of the following algorithm is also used in IoT based applications? AES PRESENT SPECK All the above None Hint 61). Abbreviate MAC? Message Authentication Code Message Auth Code More Auth Code Both a and b None Hint 62). MAC defences ____ properties of a message? Integrity Authenticity Confidentiality Both a and b None Hint 63). Message digest also represented as? MIC MAC MMC MNM None Hint 64). Which of the following terms does RFC 4949 suggests? MIC Check sum Error detection code Both a and b None Hint 65). Which of the following is the function of check sum? Detect errors Block errors Add noise All the above None Hint 66). Which of the following data security principle does checksum verifies? Data integrity Data authenticity Data confidentiality Data repudentiality None Hint 67). ____ are the functions of checksum? Hash functions Fingerprints Randomization functions All the above None Hint 68). ____ are the special type of cases of checksums? Parity bits Check digits Security digits Both a and b None Hint 69). Which of the following are applications of error correcting coding algorithm? Telecommunication Computing Coding theory All the above None Hint 70). In which of the following areas does Forward Error Correction is used? Telecommunication Information Theory Code theory All the above None Hint 71). Forward Error Correction is also called? Channel coding Error coding Correlation All the above None Hint 72). FEC type data detects __ quantity of errors within a message? Maximum Minimum Zero All the above None Hint 73). FEC is deployed in ____ devices for data recovery? Magnetic Modems ECC memory All the above None Hint 74). Which of the following crypto algo exchanges keys over public channel securely? Diffie-Hellman RSA AES Advanced AES None Hint 75). In which of the following networking layer does Diffie-Hellman key provides forward secrecy? Application type layer Transport type layer Session type layer Basic type layer None Hint Cryptography MCQ for Quiz 76). Which of the following are the TLS layers? Record Handshake protocol Termination Both a and b None Hint Read more about TLS 77). Which of the following are the applications of TLS? Email Instant Messaging VoIP All the above None Hint 78). TLS supports ___ properties of data security? Confidentiality Integrity Authenticity All the above None Hint 79). In which of the following networking layer does TLS operates? Application type layer Transport type layer Session type layer Presentation type layer None Hint 80). Which of the following attacks are averted via TLS? Eavesdropping Tampering Social engineering All the above None Hint 81). RSA algo is ____ type of key cryptosystem? Private Public Ideal All the above None Hint 82). How many rounds does RSA algo performs? 1 10 12 20 None Hint 83). Which of the following is the first step of RSA algo key generation? Select large 2 prime numbers Computation of n=pq Compute lamda(n) gcd (e,lamda(n)) None Hint 84). Which of the following is the second step of RSA algo key generation? Select large 2 prime numbers Computation of n=pq Compute lamda(n) gcd (e,lamda(n)) None Hint 85). Which of the following is the third step of RSA algo key generation? Select large 2 prime numbers Computation of n=pq Compute lamda(n) gcd (e,lamda(n)) None Hint 86). Which of the following is the fourth step of RSA algo key generation? Select large 2 prime numbers Computation of n=pq Compute lamda(n) gcd (e,lamda(n)) None Hint 87). Which of the following is the fifth step of RSA algo key generation? Select large 2 prime numbers Computation of n=pq Compute lamda(n) Finding d= e ^-1 [mod lamda(n)] None Hint 88). Which of the following are modern type of ciphers? Private key Public key Transposition cipher Both a and b None Hint 89). In which of the following type of crypto similar keys are used for encryption and decryption? Symmetric key Asymmetric key Public key Both b and c None Hint 90). In which of the following type of crypto different keys are used for encryption and decryption? Symmetric key Asymmetric key Public key Both b and c None Hint 91). Block type cipher operates on ____ length of groups? Fixed Constant Zero All the above None Hint 92). Which of the following are the types of ECC codes? Block codes Convolution codes RS codes Both a and b None Hint 93). Soft decision algorithm ____ the digital based data? Modulates Demodulates Truncates Both b and c None Hint 94). Which of the following factors of bit error rate affects the signal? Interference Distortion Attenuation All the above None Hint Read more about Attenuation 95). Which of the following are the simple channel modes used for information based theory? Binary symmetric channel AWGN channel Binary asymmetric channel Both a and b None Hint 96). Which of the following are the components of BERT? Pattern generator Error detector Clock signal based generator All the above None Hint 97). Which of the following component of BERT synchronises pattern generator and error detector? Pattern generator Error detector Clock signal based generator Analyser None Hint 98). Which of the following are the type of digital patterns generators? Stand alone units Add on hardware modules Logic analysers All the above None Hint 99). Which of the following are the bit patterns generated by digital pattern generators? 8 16 32 All the above None Hint 100). Which of the following are the voltage standards? TTL LVTTL LVDS All the above None Hint Read more about TTL For More MCQs Hamming Codes Questions & Answers Please fill in the comment box below. Time's up