Cryptography MCQ set number 00521

1. AES uses a ____________ bit block size and a key size of __________ bits.
a) 128; 128 or 256
b) 64; 128 or 192
c) 256; 128, 192, or 256
d) 128; 128, 192, or 256

Answer

Answer: d [Reason:] It uses a 128-bit block size and a key size of 128, 192, or 256 bits.

2. Like DES, AES also uses Feistel Structure.
a) True
b) False

Answer

Answer: b [Reason:] AES does not use a Feistel structure. Instead, each full round consists of four separate functions:
-byte substitution
-Permutation
-arithmetic operations over a finite field, and
-XOR with a key.

3. Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?
a) JUPITER
b) Blowfish
c) Serpent
d) Rijndael

Answer

Answer: a [Reason:] JUPITER is not a cryptographic algorithm.

4. Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm?
a) MARS
b) Blowfish
c) RC6
d) Rijndael

Answer

Answer: a [Reason:] In October 2000 the Rijndael algorithm was selected as the winner and NIIST officially announced that Rijndael has been chosen as Advanced Encryption Standard (AES) in November 2001.

5. How many rounds does the AES-192 perform?
a) 10
b) 12
c) 14
d) 16

Answer

Answer: b [Reason:] AES 192 performs 12 rounds.

6. How many rounds does the AES-256 perform?
a) 10
b) 12
c) 14
d) 16

Answer

Answer: c [Reason:] AES 256 performs 14 rounds.

7. What is the expanded key size of AES-192?
a) 44 words
b) 60 words
c) 52 words
d) 36 words

Answer

Answer: c [Reason:] AES-192 has an expanded key size of 52 words.

8. The 4×4 byte matrices in the AES algorithm are called
a) States
b) Words
c) Transitions
d) Permutations

Answer

Answer: a [Reason:] The matrices are called states.

9. In AES the 4×4 bytes matrix key is transformed into a keys of size __________
a) 32 words
b) 64 words
c) 54 words
d) 44 words

Answer

Answer: d [Reason:] In AES the 4×4 bytes matrix key is transformed into a keys of size 44 bytes.

10. For the AES-128 algorithm there are __________ similar rounds and _________ round is different.
a) 2 pair of 5 similar rounds ; every alternate
b) 9 ; the last
c) 8 ; the first and last
d) 10 ; no

Answer

Answer: b [Reason:] In the AES-128 there are 9 similar rounds and the last round is different.

11. Which of the 4 operations are false for each round in the AES algorithm
i) Substitute Bytes
ii) Shift Columns
iii) Mix Rows
iv) XOR Round Key

a) i) only
b) ii) iii) and iv)
c) ii) and iii)
d) only iv)

Answer

Answer: b [Reason:] AES rounds involve substitute bytes, shift rows, mix columns and addition of round key.

12. There is an addition of round key before the start of the AES round algorithms.
a) True
b) False

Answer

Answer: a [Reason:] In AES the final round contains only three transformations, and there is an initial single transformation (Add Round Key) before the first round which can be considered Round 0. Each transformation takes 4×4 matrixes as input and produces a 4×4 matrix as output.

ed010d383e1f191bdb025d5985cc03fc?s=120&d=mm&r=g

DistPub Team

Distance Publisher (DistPub.com) provide project writing help from year 2007 and provide writing and editing help to hundreds student every year.