250+ TOP MCQs on Pseudorandom Number Generators and Stream Ciphers Answers

Cryptography Multiple Choice Questions on “Pseudorandom Number Generators and Stream Ciphers”.

1. Using the Linear Congruential Method (LCM), for a=7, c=0 and m=32. The period is
a) 13
b) 4
c) 11
d) 7

Answer: b
Clarification: The sequence generated is {7,17,23,1,7..}. Thus the period is 4.

2. Using the Linear Congruential Method, for a=5, c=0 and m=32. The period is
a) 8
b) 4
c) 9
d) 11

Answer: a
Clarification: The sequence generated is {2,25,29,17,21,9,13,1,5,2…}. Thus the period is 8.

3. The appropriate value for m (in LCM) is
a) 2(31) – 1
b) 2(31)
c) 2(32)
d) 2(32) – 1

Answer: a
Clarification: Typically 2^(31) – 1 is chosen as the value for m (a large prime number).

4. A CSPRBG is defined as one that passes the __ test.
a) Runs test
b) Maurer’s Universal statistical test
c) Frequency Test
d) On-bit test

Answer: d
Clarification: A CSPRBG is defined as one that passes the one-bit test.

5. Find the first 8 bits for Blum Blum Shub Bit Generator when seed = 101355 and n = 192649.
a) 10101010
b) 11100010
c) 11001011
d) 11001110

Answer: d
Clarification: The blum blum shub algorithm is as follows-
Xo = s2 mod n
for i=1 to 8
Xi = X(i-1)2 mod n
Bi = Xi mod 2
Using this we compute the bits as – 11001110.

6. Which of these modes is an appropriate mode for PRNG?
a) ECB
b) CBC
c) CFB
d) CTR

Answer: d
Clarification: CTR and OFB are suitable modes for PRNG.

7. Which mode is recommend for the X9.82 Random number generator?
a) OFB
b) CBC
c) CFB
d) CTR

Answer: a
Clarification: OFB is the recommended mode for the X9.82 Random number generator.

8. AES PRNG produces bits outputs of size
a) 512 bits
b) 128 bits
c) 256 bits
d) 64 bits

Answer: b
Clarification: AES PRNG produces bits outputs of size 128 bits.

9. Which mode is recommend for the ANSI standard X9.82 Random number generator?
a) OFB
b) CTR
c) CFB
d) CFB

Answer: b
Clarification: CTR is the recommended mode for the ANSI standard X9.82 Random number generator.

10. The CTR algorithm for PRNG is known as
a) CTR_PRNG
b) X-SESS
c) CTR-SESS
d) CTR_DRBG

Answer: d
Clarification: The CTR algorithm for PRNG is known as CTR_DRBG.

11. Which mode is recommend for the RFC 4086 Random number generator?
a) CFB
b) CBC
c) OFB
d) CTR

Answer: c
Clarification: OFB is the recommended mode for the RFC 4086 Random number generation.

12. while (len(temp) < requested_number_of_bits) do
V = E(Key, V)
temp = temp || V

The above algorithm is for the CTR mode.
a) True
b) False. It is for the ECB mode
c) False. It is for the OFB mode
d) False. It is for the CFB mode

Answer: c
Clarification: The algorithm above is the OFB mode representation.

250+ TOP MCQs on Elliptic Curve Arithmetic/Cryptography

Cryptography online quiz on “Elliptic Curve Arithmetic/Cryptography”.

1. On adding the two points P (4,2) and Q (10, 6) in the elliptic curve E11(1,1) we get
a) (9,3)
b) (6,4)
c) (7,5)
d) (2,8)

Answer: b
Clarification: Apply ECC to obtain P+Q=(6,4).

2. If P = (1,4) in the elliptic curve E13(1, 1) , then 4P is
a) (4, 2)
b) (7, 0)
c) (5, 1)
d) (8, 1)

Answer: d
Clarification: Apply ECC via adding P+P=2P then, 4P=2P+2P.

3. Multiply the point P=(8, 1) by a constant 3, thus find 3P, in the elliptic curve E13(1, 1)
a) (10,7)
b) (12,6)
c) (11,1)
d) (9,8)

Answer: a
Clarification: P+P=2P then, 3P=2P+P
Thus we get Q=3P = (10, 7).

4. Bob selects E67(2, 3) as the elliptic curve over GF(p). He selects e1 = (2, 22) and d = 4.
Then he calculates e2 = d × e1 .What is the value of e2?
a) (23,49)
b) (16,55)
c) (12,19)
d) (13,45)

Answer: d
Clarification: e2 = d × e1 ; e2 =(13, 45).

5. Bob selects E67(2, 3) as the elliptic curve over GF(p). He selects e1 = (2, 22) and d = 4.
Then he calculates e2 = d × e1 and the publicly announces the tuple (E, e1, e2). Now, Alice wants to send the plaintext P = (24, 26) to Bob and she selects r = 2. What are C1 and C2?
a) C1=(35,1) ; C2 =(21,44)
b) C1=(44,21) ; C2 =(1,35)
c) C1=(44,21) ; C2 =(44,21)
d) C1=(21,44); C2 =(35,1)

Answer: a
Clarification: Alice finds the points C1= r × e1 ; C1= (35, 1),
C2=P + r × e2 ; C2= (21, 44).

6. P = C1 – (d x C2)
Is this above stated formula true with respect to ECC?
a) True
b) False

Answer: b
Clarification: P = C2 – (d x C1).

7. For the point P (11, 2) defined in the curve E13(1, 1). What is –P?
a) (12,4)
b) (10,7)
c) (11,11)
d) (11,12)

Answer: c
Clarification: The inverse of P(11,2) is (11,11) or (11,-2).

8. For the point P (7, 0) defined in the curve E13(1, 1). What is –P?
a) (7,1)
b) (8,12)
c) (8,1)
d) (7,0)

Answer: d
Clarification: The inverse of P(11,2) is (11,11) or (11,-2).

250+ TOP MCQs on Public Keys and X.509 Certificates

Cryptography Multiple Choice Questions on “Public Keys and X.509 Certificates”.

1. Public key encryption/decryption is not preferred because
a) it is slow
b) it is hardware/software intensive
c) it has a high computational load
d) all of the mentioned

Answer: d
Clarification: Due to high computational load ( thus being slow ) public key systems are not preferred for large cryptosystems and large networks.

2. Which one of the following is not a public key distribution means?
a) Public-Key Certificates
b) Hashing Certificates
c) Publicly available directories
d) Public-Key authority

Answer: b
Clarification: Hashing certificates is some I just made up. It doesn’t exist noob.

3. What is the PGP stand for?
a) Permuted Gap Permission
b) Permuted Great Privacy
c) Pretty Good Permission
d) None of the mentioned

Answer: d
Clarification: PGP stands for Pretty Good Privacy.

4. PGP makes use of which cryptographic algorithm?
a) DES
b) AES
c) RSA
d) Rabin

Answer: c
Clarification: PGP recommends the use of RSA.

5. USENET is related to which of the following Public Key distribution schemes?
a) Public-Key Certificates
b) Public announcements
c) Publicly available directories
d) Public-Key authority

Answer: b
Clarification: Many PGP users append their public key to messages that they send to public forums, such as USENET and Internet mailing lists.

6. Which of the following public key distribution systems is most secure?
a) Public-Key Certificates
b) Public announcements
c) Publicly available directories
d) Public-Key authority

Answer: a
Clarification: Public certificates are the most secure key distribution/management systems right now.

7. Which systems use a timestamp?
i) Public-Key Certificates
ii) Public announcements
iii) Publicly available directories
iv) Public-Key authority

a) i) and ii)
b) iii) and iv)
c) i) and iv)
d) iv) only

Answer: c
Clarification: Public announcements and Public Certificates involve the use of timestamps.

8. Which of these systems use timestamps as an expiration date?
a) Public-Key Certificates
b) Public announcements
c) Publicly available directories
d) Public-Key authority

Answer: a
Clarification: Public key certificates use timestamps as expiration dates.

9. Which system uses a trusted third party interface?
a) Public-Key Certificates
b) Public announcements
c) Publicly available directories
d) Public-Key authority

Answer: a
Clarification: Public-Key certificates use a trusted third party interface.

10. Publicly Available directory is more secure than which other system?
a) Public-Key Certificates
b) Public announcements
c) Public-Key authority
d) None of the mentioned

Answer: b
Clarification: Publicly Available directory is more secure than Public announcements.

250+ TOP MCQs on Classful Addressing and Answers

Network Security Multiple Choice Questions on “Classful Addressing”.

1. Each block in class A contains _____________ addresses.
a) 216
b) 224
c) 28
d) 214

Answer: b
Clarification: Each block in class A contains 224 addresses.

2. Each block in class B contains __________ addresses.
a) 28
b) 224
c) 214
d) 216

Answer: d
Clarification: Each block in class B contains 216 addresses.

3. Number of Blocks in class B are –
a) 212
b) 216
c) 214
d) 218

Answer: c
Clarification: Number of Blocks in class B are 214.

3. Number of Blocks in class C are –
a) 212
b) 216
c) 214
d) 218

Answer: c
Clarification: Number of Blocks in class C are 214.

4. Percent of addresses occupied by Class D?
a) 50 %
b) 25 %
c) 6.25 %
d) 12.5 %

Answer: c
Clarification: Class D has 228 addresses in total.

5. Which of the following does not have a Net ID and Host ID?
a) Class A
b) Class B
c) Class C
d) Class D

Answer: d
Clarification: Class D is the multicast address class. It does not have Net ID and Host ID fields.

6. Which Class is reserved for future use?
a) A
b) B
c) D
d) None of the Mentioned

Answer: d
Clarification: Class E is reserved for future use.

7. Number of Blocks in class C are –
a) 27
b) 28
c) 214
d) 29

Answer: a
Clarification: Number of Blocks in class A are 27.

8. What is the size of the Host ID in Class C?
a) 24 bits
b) 16 bits
c) 8 bits
d) 14 bits

Answer: c
Clarification: The size of the Host ID in Class C is 8 bits.

An address in a block is given as 180.8.17.9. Find the number of addresses in the block, the first address, and the last address.

9. Address of the block is –
a) 214
b) 216
c) 28
d) 224

Answer: b
Clarification: Since 180 is between 128 and 191, it is class B address n=16.
N = 2(32-n) = 216 = 65,536.

10. First Address is –
a) 180.8.0.0
b) 180.7.64.0
c) 180.8.1.256
d) 180.12.0.0

Answer: a
Clarification: Keep the leftmost 16 bits and set the rightmost 16 bits all to 0s. First address = 180.8.0.0, in which 16 is the value of n.

11. Last Address is –
a) 180.8.255.255.
b) 180.8.255.0.
c) 180.12.0.255.
d) 180.9.255.255.

Answer: a
Clarification: Keep the leftmost 16 bits and set the rightmost 16 bits all to 1s. Last address = 180.8.255.255.

12. A router receives a packet with the destination address 132.7.21.84. Find the network address of the packet.
a) 1.32.7
b) 132.7
c) 13.27
d) 21.84

Answer: b
Clarification: 132 is between 128 and 191, so it is Class B address i.e. n=16-bit. Therefore,
Network address 132.7
Host address 21.84.

250+ TOP MCQs on The Simplified Data Encryption Standard (SDES)

Cryptography Multiple Choice Questions on “The Simplified Data Encryption Standard (SDES)”.

1. What is the size of the key in the SDES algorithm?
a) 24 bits
b) 16 bits
c) 20 bits
d) 10 bits

Answer: d
Clarification: The size of the key in the SDES algorithm is 10 bits.

2. Assume input 10-bit key, K: 1010000010 for the SDES algorithm. What is K1?
a) 10100100
b) 01011011
c) 01101000
d) 10100111

Answer: a
Clarification: The permuted key P10 = 1000001100. Input to P8: 0000111000 and
K1 is 10100100.

3. Assume input 10-bit key, K: 1010000010 for the SDES algorithm. What is K2?
a) 10100111
b) 01000011
c) 00100100
d) 01011010

Answer: b
Clarification: Input to P8: 0010000011 and K2 is 01000011.

4. The Ciphertext for the Plaintext 01110010, given that the keys K1 is 10100100 and K2 is 01000011 is
a) 01110111
b) 10010110
c) 01010110
d) 01000101

Answer: a
Clarification: Perform the SDES algorithm and compute the cipher text.

5. The Ciphertext for the Plaintext 11010101, given that the key is 0111010001 is
a) 00010001
b) 10110010
c) 11010010
d) 01110011

Answer: d
Clarification: Perform the SDES Encryption algorithm and compute the cipher text.

6. The Plaintext for the Ciphertext 00100010, given that the key is 1111111111 is
a) 01100111
b) 00001010
c) 01001000
d) 01001100

Answer: d
Clarification: Perform the SDES Decryption algorithm and compute the cipher text.

7. In SDES, Encryption algorithm can be written as a composition of functions:
IP-1 o fK2 o fK1 o SW o IP
a) True
b) False

Answer: b
Clarification: The SDES algorithm follows the order – IP-1 o fK2 o SW o fK1 o IP.

8. Assume input 10-bit key, K: 0010010111 for the SDES algorithm. What is K1?
a) 00101111
b) 01011011
c) 01101000
d) 10100111

Answer: a
Clarification: The permuted key P10 = 1000010111. Input to P8: 0000101111 and K1 is 00101111.

9. The Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is
a) 01100111
b) 00001010
c) 11111111
d) 01101101

Answer: c
Clarification: Perform the SDES Decryption algorithm and compute the cipher text.

10. The Plaintext for the Ciphertext 11110000, given that the key is 0000000000 is
a) 01100111
b) 00000000
c) 01001000
d) 01101100

Answer: b
Clarification: Perform the SDES Decryption algorithm and compute the cipher text.

11. Assume input 10-bit key, K: 0010010111 for the SDES algorithm. What is K2?
a) 11101010
b) 11011011
c) 01101000
d) 10101111

Answer: a
Clarification: The permuted key P10 = 0000101111. Input to P8: 0010011101 and K2 is 11101010.

12.The Plaintext for the Ciphertext 10100101, given that the key is 0010010111 is
a) 01100111
b) 00110110
c) 01001000
d) 01001100

Answer: b
Clarification: Perform the SDES Decryption algorithm and compute the cipher text.

250+ TOP MCQs on Pseudorandom Number Generators and Stream Ciphers and Answers

Cryptography Test on “Pseudorandom Number Generators and Stream Ciphers”.

1. Which mode is less prone to decryption : PRNG using CTR / PRNG using OFB?
a) OFB
b) CTR
c) Both are equally prone
d) Both can’t be decrypted

Answer: b
Clarification: CTR mode is more prone than the OBF mode.

2. ANSI X9.17 uses a seed of size
a) 56 bits
b) 64 bits
c) 32 bits
d) 128 bits

Answer: b
Clarification: The seed in ANSI X9.17 is of 64 bits and the randomly generated keys are of size 56 bits.

3. How many 3DES blocks are present in the ANSI X9.17 PRNG?
a) 2
b) 3
c) 4
d) 5

Answer: b
Clarification: There are 3 3DES blocks in the ANSI X9.17 PRNG.

4. How many DES encryptions take place in the ANSI X9.17 PRNG?
a) 3
b) 6
c) 9
d) 12

Answer: d
Clarification: Since there are 3 block, 12 DES encryptions take place.

5. How many keys are used in the ANSI X9.17 PRNG?
a) 3
b) 2
c) 4
d) 6

Answer: a
Clarification: 2 keys are used for the 3DES Encrypt Decrypt Encrypt method.

6. Which of the following PRNGs is used in most recent Intel Chips?
a) ANSI X9.17 PRNG
b) NIST CTR_DRBG
c) ANSI standard X9.82
d) None of the mentioned

Answer: b
Clarification: NIST CTR_DRBG is the PRNG used in most Intel Chips.

7. For the NIST CTR_DRBG , Seed length =
a) Output Block Length
b) Reseed Interval
c) Reseed Interval + Output Block Length
d) Output Block Length + Key Length

Answer: d
Clarification: Seed length = Output Block Length + Key Length

8. The CTR mode uses a Key K and an Initial Vector V. The Intel Digital Random Number generator has these values initially as
a) K = 0 ; V = 1
b) K = 0 ; V = 0
c) K = 1 ; V = 1
d) K = 1 ; V = 0

Answer: b
Clarification: K = 0 ; V = 0 for Intel Digital Random Number generator. (Initial Values)

9. What is the Seed length (seedlen) length for AES-192 ?
a) 428
b) 384
c) 320
d) 512

Answer: c
Clarification: Seed length = Output Block Length + Key Length = 128 + 192.

10. What is the Seed length (seedlen) length for 3DES?
a) 284
b) 260
c) 232
d) 216

Answer: c
Clarification: Seed length = Output Block Length + Key Length = 64 + 232.

11. The Generate function precedes the Update phase in CTR_DRBG.
a) True
b) False

Answer: a
Clarification: The Generate function comes after the Update Phase function.

12. With reference to stream ciphers, the output of the generator is called
a) Byte Stream
b) Re-Seed Interval
c) Key Length
d) Keystream

Answer: d
Clarification: The generator produces the Keystream.

13. Which of the following is not a valid design parameter to be considered in designing stream ciphers?
a) Keystream should be truly as random as possible
b) Encryption sequence should have a large value
c) Output of the PRNG (the key) should be sufficiently large
d) All of the mentioned are valid points that should be considered while designing stream cipher blocks

Answer: d
Clarification: a, b and c are all valid design parameters.