Advanced Encryption Algorithm and Block Ciphers operations MCQs

Advanced Encryption Algorithm and Block Ciphers operations MCQs

 1. AES uses a ____________ bit block size and a key size of __________ bits.. 

A. 128; 128 or 256. 

B. 64; 128 or 192. 

C. 256; 128, 192, or 256. 

D. 128; 128, 192, or 256. 

Answer= 128; 128, 192, or 256


2. Like DES, AES also uses Feistel Structure.. 

A. TRUE. 

B. FALSE. 

C. Nothing can be said. 

D. None of the mentioned. 

Answer= FALSE


3. Which one of the following is not a cryptographic algorithm- JUPITER, Blowfish, RC6, Rijndael and Serpent?. 

A. JUPITER. 

B. Blowfish. 

C. Serpent. 

D. Rijndael. 

Answer= JUPITER


4. Which algorithm among- MARS, Blowfish, RC6, Rijndael and Serpent -was chosen as the AES algorithm?. 

A. MARS. 

B. Blowfish. 

C. RC6. 

D. Rijndael. 

Answer= MARS


5. How many rounds does the AES-192 perform?. 

A. 10. 

B. 12. 

C. 14. 

D. 16. 

Answer= 12


6. How many rounds does the AES-256 perform?. 

A. 10. 

B. 12. 

C. 14. 

D. 16. 

Answer= 14


7. What is the expanded key size of AES-192?. 

A. 44 words. 

B. 60 words. 

C. 52 words. 

D. 36 words. 

Answer= 52 words


8. The 4×4 byte matrices in the AES algorithm are called. 

A. States. 

B. Words. 

C. Transitions. 

D. Permutations. 

Answer= States


9. In AES the 4×4 bytes matrix key is transformed into a keys of size __________. 

A. 32 words. 

B. 64 words. 

C. 54 words. 

D. 44 words. 

Answer= 44 words


10. For the AES-128 algorithm there are __________ similar rounds and _________ round is different.. 

A. 2 pair of 5 similar rounds ; every alternate. 

B. 9 ; the last. 

C. 8 ; the first and last. 

D. 10 ; no. 

Answer= 9 ; the last


11. Which of the 4 operations are false for each round in the AES algorithm i) Substitute Bytes ii) Shift Columns iii) Mix Rows iv) XOR Round Key. 

A. i) only. 

B. ii) iii) and iv). 

C. ii) and iii). 

D. only iv). 

Answer= ii) iii) and iv)


12. There is an addition of round key before the start of the AES round algorithms.. 

A. TRUE. 

B. FALSE. 

C. Nothing can be said. 

D. None of the mentioned. 

Answer= TRUE


13. The multiplicative inverse of 0x95 in AES where m(x)=x8+x4+x3+x+1 is. 

A. 0x8F. 

B. 0xF8. 

C. 0x8A. 

D. 0xA8. 

Answer= 0x8A


14. The S-box value for byte stored in cell (6,D). 

A. 0x3C. 

B. 0x7F. 

C. 0xFD. 

D. 0x4A. 

Answer= 0x3C


15. The S-box value for byte stored in cell (B,3). 

A. 0x3C. 

B. 0xB3. 

C. 0x4F. 

D. 0x90. 

Answer= 0xB3


16. The S-box value for byte stored in cell (3,3). 

A. 0xC3. 

B. 0x3C. 

C. 0x44. 

D. 0x9B. 

Answer= 0xC3


17. The inverse s-box permutation follows, b'_i = b_(i+2) XOR b(i+5) XOR b_(i+7) XOR d_i ; Here d_i is. 

A. d_i is the ith bit of a byte 'd' whose hex value is 0x15. 

B. d_i is the ith bit of a byte 'd' whose hex value is 0x05. 

C. d_i is the ith bit of a byte 'd' whose hex value is 0x25. 

D. d_i is the ith bit of a byte 'd' whose hex value is 0x51. 

Answer= d_i is the ith bit of a byte 'd' whose hex value is 0x05


18. The Inverse S-box value for byte stored in cell (3,3). 

A. 0xC3. 

B. 0x66. 

C. 0x1F. 

D. 0x9B. 

Answer= 0x66


19. The Inverse S-box value for byte stored in cell (6,3). 

A. 0x00. 

B. 0x11. 

C. 0x01. 

D. 0x04. 

Answer= 0x00


20. The Inverse S-box value for byte stored in cell (D,2). 

A. 0x5F. 

B. 0x2D. 

C. 0x7F. 

D. 0x5D. 

Answer= 0x7F


21. How many computation rounds does the simplified AES consists of?. 

A. 5. 

B. 2. 

C. 8. 

D. 10. 

Answer= 2


22. For the case of Mixed Columns and Inverse Mixed Columns, is it true that b(x) = a-1(x)mod(x4 + 1); where a(x) = {03}x3 +  {01}x2 +  {01}x +  {02} and b(x) = {0B}x3 +  {0D}x2 +  {09}x +  {0E}. 

A. TRUE. 

B. False. The expression for a(x) is wrong.. 

C. False. The expression for b(x) is wrong.. 

D. False. Both a(x) and b(x) are faulty.. 

Answer= TRUE


23. For an inputs key of size 128 bits constituting of all zeros, what is w(7) ?. 

A. {62 63 63 63}. 

B. {62 62 62 62}. 

C. {00 00 00 00}. 

D. {63 63 63 62}. 

Answer= {62 63 63 63}


24. On comparing AES with DES, which of the following functions from DES does not have an equivalent AES function?. 

A. f function. 

B. permutation p. 

C. swapping of halves. 

D. xor of subkey with function f. 

Answer= swapping of halves


25. On perform the Mix Columns transformation for the sence of bytes "77 89 AB CD" we get output. 

A. {01 55 EE 4A}. 

B. {0A 44 EF 4A}. 

C. {08 55 FF 3A}. 

D. {09 44 DD 4A}. 

Answer= {08 55 FF 3A}


26. On perform the Mix Columns transformation for the sence of bytes "67 89 AB CD" we get output. 

A. {08 55 FF 18}. 

B. {28 45 EF 08}. 

C. {28 45 FF 18}. 

D. {25 35 EF 08}. 

Answer= {28 45 EF 08}


27. Is the following matrix the inverse matrix of the matrix used in the mix columns step?x3 + 1      xx            x3 + 1. 

A. Yes. 

B. No. 

C. Can't say. 

D. Insufficient Information. 

Answer= Yes


28. For the cipher text 0000 0111 0011 1000 and Key 0110 1111 0110 1011, apply the Simplified AES to obtain the plaintext. The plain text is. 

A. 0110 1001 0111 0001. 

B. 0110 1111 0110 1011. 

C. 0010 1001 0110 1011. 

D. 1111 0101 0111 1111. 

Answer= 0110 1111 0110 1011


29. What is the block size in the Simplified AES algorithm?. 

A. 8 bits. 

B. 40 bits. 

C. 16 bits. 

D. 36 bits. 

Answer= 40 bits


30. What is the key size in the S-AES algorithm?. 

A. 16 bits. 

B. 32 bits. 

C. 24 bits. 

D. None of the mentioned. 

Answer= 16 bits


31. S-AES and S-DES were both developed by the same person as an educational cryptography system to teach students. 

A. TRUE. 

B. FALSE. 

C. Nothing can be said. 

D. None of the mentioned. 

Answer= TRUE


32. Which of the following is a faulty S-AES step function?. 

A. Add round key. 

B. Byte substitution. 

C. Shift rows. 

D. Mix Columns. 

Answer= Byte substitution


33. Which mode of operation has the worst "error propagation" among the following?. 

A. OFB. 

B. CFB. 

C. CBC. 

D. ECB. 

Answer= ECB


34. Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution?. 

A. OFB. 

B. CTR. 

C. CBC. 

D. ECB. 

Answer= CTR


35. Which mode requires the implementation of only the encryption algorithm?. 

A. ECB. 

B. CBC. 

C. CTR. 

D. OFB. 

Answer= CTR


36. Which of the following modes of operation does not involve feedback?. 

A. ECB. 

B. CBC. 

C. CTR. 

D. OFB. 

Answer= ECB


37. Which of the following is a natural candidates for stream ciphers?. 

A. OFB. 

B. CFB. 

C. CBC. 

D. ECB. 

Answer= OFB


38. The XTS-AES mode was approved by NIST in. 

A. 1999. 

B. 2010. 

C. 2006. 

D. 2002. 

Answer= 2010


39. The XTS-AES mode is based on the concept of tweakable block cipher.. 

A. TRUE. 

B. FALSE. 

C. Nothing can be said. 

D. None of the mentioned. 

Answer= TRUE


40. The purpose of a 'tweak' in XTS-AES mode is to. 

A. secure the public key. 

B. provide security. 

C. provide variability. 

D. all of the mentioned. 

Answer= provide variability


41. A tweak is used in XTS-AES mode to provide a different output for the same input PT and same key.. 

A. TRUE. 

B. FALSE. 

C. Nothing can be said. 

D. None of the mentioned. 

Answer= TRUE


42. XTS-AES mode of operation is a better version of. 

A. OFB. 

B. CFB. 

C. CTR. 

D. ECB. 

Answer= ECB


43. What is the size of the XTS-AES key?. 

A. 1024 bits. 

B. 64 bits. 

C. 512 bits. 

D. 128 bits. 

Answer= 512 bits


44. Which of the following represent the tweak?. 

A. j. 

B. i. 

C. alpha. 

D. alphaj. 

Answer= i


45. Which of the following is true for the tweak in XTS-AES mode?. 

A. they are non-negative integers. 

B. they are of size 128 bits. 

C. they are assigned consecutively. 

D. all of the mentioned. 

Answer= all of the mentioned


46. Which of the following is the correct encryption statement representation for the XTS-AES mode?. 

A. E(K1,P) XOR T. 

B. E(K2,T) XOR P. 

C. E(K1,T XOR P) XOR P. 

D. E(K1,P XOR T) XOR T. 

Answer= E(K1,P XOR T) XOR T


47. The last two blocks of the XTS-AES mode are   

A. padded as 10*. 

B. encrypted/ decrypted using ciphertext-stealing. 

C. padded as 10*1. 

D. padded and then swapped after encryption/ decryption. 

Answer= encrypted/ decrypted using ciphertext-stealing


48. How many modes of operation are there in in DES and AES?. 

A. 4. 

B. 3. 

C. 2. 

D. 5. 

Answer= 5


49. Which one of the following modes of operation in DES is used for operating short data?. 

A. Cipher Feedback Mode (CFB). 

B. Cipher Block chaining (CBC). 

C. Electronic code book (ECB). 

D. Output Feedback Modes (OFB). 

Answer= Electronic code book (ECB)


50. Which of the following is false for ECB mode of operation i) The Plain text is broken into blocks of size 128 bytes ii) Blocks can be swapped, repeated, replaced without recipient noticing iii) Good for short data iv) Encryption of each block is done separately using a randomly generated key for each block. 

A. i) only. 

B. ii) and iii). 

C. i) and iv). 

D. i) ii) and iv). 

Answer= i) and iv)


51. Which of the following statements are true : i) In the CBC mode, the plaintext block is XORed with previous ciphertext block before encryption  ii) The CTR mode does not require an Initialization Vector  iii) The last block in the CBC mode uses an Initialization Vector  iv) In CBC mode repetitions in plaintext do not show up in ciphertext. 

A. iii). 

B. ii) and iv). 

C. All the Statements are true. 

D. i) ii) and iv). 

Answer= i) ii) and iv)


52. There is a dependency on the previous 's' bits in every  stage in CFB mode. Here 's' can range from ___. 

A. 8-16 bits. 

B. 8-32 bits. 

C. 4-16 bits. 

D. 8-48 bits. 

Answer= 8-32 bits


53. Which of the following can be classified under advantages and disadvantages of OFB mode?  i) Transmission errors  ii) A bit error in a ciphertext segment  iii) Cannot recover from lost ciphertext segments  iv) Ciphertext or segment loss. 

A. Advantages: None; Disadvantages: All. 

B. Advantages: All; Disadvantages: None. 

C. Advantages: i); Disadvantages: ii) iii) iv). 

D. Advantages: i); ii) Disadvantages: iii) iv). 

Answer= Advantages: i); ii) Disadvantages: iii) iv)


54. In OFB Transmission errors do not propagate: only the current ciphertext is affected, since keys are generated "locally".. 

A. TRUE. 

B. FALSE. 

C. Nothing can be said. 

D. None of the mentioned. 

Answer= TRUE


55. Which of the following modes does not implement chaining or "dependency on previous stage computations"?. 

A. CTR, ECB. 

B. CTR, CFB. 

C. CFB, OFB. 

D. ECB, OFB. 

Answer= CTR, ECB


56. The counter value in CTR modes repeats are a regular interval.. 

A. TRUE. 

B. FALSE. 

C. Nothing can be said. 

D. None of the mentioned. 

Answer= FALSE


57. How many step function do Round 1 and 2 each have in S-AES?. 

A. 4 and 3. 

B. Both 4. 

C. 1 and 4. 

D. 3 and 4. 

Answer= 4 and 3


58. For a key 25D5 and PT input A479 what is the output we obtain after the "add round key" function?. 

A. F34D. 

B. 81AC. 

C. 79DF. 

D. 327D. 

Answer= 81AC


59. The output of the previous stion, on passing through "nibble substitution" gets us the output. 

A. 3267. 

B. 1344. 

C. 64C0. 

D. CA37. 

Answer= 64C0


60. The output of the previous stion on passing through the "shift row" step function gives us the output. 

A. C046. 

B. 0C64. 

C. 64C0. 

D. 640C. 

Answer= 0C64


61. The output of the previous stion on passing through the "mix columns" step function gives us the output. 

A. 3252. 

B. 3743. 

C. 3425. 

D. 3473. 

Answer= 3473


62. The inverse transformation matrix times the forward transformation matrix equals the identity matrix.. 

A. TRUE. 

B. FALSE. 

C. Nothing can be said. 

D. None of the mentioned. 

Answer= Nothing can be said


63. Which of the following are true: i) In the AES key expansion algorithm, the function g() operates on w i+3  ii) Perform a one-byte right circular rotation on the argument 4-byte word  iii) The round constant follows the formula RC[j]  = RC[j ? 1]. 

A. i) ii). 

B. ii) only. 

C. i) only. 

D. All. 

Answer= i) only


64. How many round keys are generated in the AES algorithm?. 

A. 11. 

B. 10. 

C. 8. 

D. 12. 

Answer= 11


65. Which function can be used in AES multiplication. 

A. m(x)=x7+x4+x3. 

B. m(x)=x8+x4+x3+x+1. 

C. m(x)=x8+x3+x2+x+1. 

D. m(x)=x8+x5+x3+x. 

Answer= m(x)=x8+x4+x3+x+1

Previous Post Next Post