250+ TOP MCQs on Running Key Cipher and Answers

Data Structures & Algorithms Multiple Choice Questions on “Running Key Cipher”.

1. What is the significance of indicator block in running key cipher?
a) it helps in encryption
b) it strengthens the cipher
c) it gives information regarding the book/text from where the key is taken
d) it makes encryption easy

Answer: c
Clarification: The purpose of having an indicator block in running key cipher is to give information to the receiver about the source of a key being used. It is usually included in the second last block of the message.

2. Running key cipher is an example of _______________
a) mono-alphabetic cipher
b) poly-alphabetic cipher
c) transposition cipher
d) additive cipher

Answer: b
Clarification: Running key cipher is a substitution cipher. It falls under the category of poly alphabetic cipher as it uses multiple substitutions at different positions in order to cipher the plain text.

3. Encryption in running key cipher is done using _______________
a) running key table
b) vigenere cycle
c) tabula recta
d) any table provided by the person performing the encryption
Answer: c
Clarification: Encryption of plain text in running key cipher is done by making use of tabula recta. The same table is also used for encryption in vigenere cipher.

4. Which of the following cipher uses a key book or a key text instead of a keyword?
a) vigenere cipher
b) autokey cipher
c) running key cipher
d) affine cipher

Answer: c
Clarification: Running key cipher is a poly alphabetic cipher. It uses a key book or key text instead of a keyword which is agreed by both parties before encryption takes place.

5. Which of the following is a difference between running key cipher and vigenere cipher?
a) they use different tables for encryption
b) vigenere cipher is poly alphabetic whereas running key cipher is mono alphabetic
c) in vigenere cipher the key is repeated whereas in running key cipher key is not repeated
d) vigenere cipher was used in ancient time whereas running key cipher is used in modern world

Answer: c
Clarification: In running key cipher key is not repeated unlike vigenere cipher. They both use the same table for encryption.

6. Tabula recta consists of _______________
a) 26 rows and 26 columns
b) 26 rows and 1 column
c) 1 row and 26 columns
d) 27 rows and 27 columns

Answer: a
Clarification: Encryption of plain text using running key cipher is done by making use of tabula recta. It consists of 26 rows and 26 columns which have alphabets written 26 times. These are shifted towards left after each row.

7. Running key cipher is harder to decipher than keyword cipher.
a) true
b) false

Answer: a
Clarification: Keyword cipher is less secure than running key cipher. It is due to the fact that keyword cipher is mono alphabetic and thus can be cracked using frequency analysis. But running key cipher being a poly alphabetic cipher is harder to crack.

8. What will be the plain text corresponding to cipher text “KEPWSN” if running key cipher is used with keyword as “”?
a) SECRET
b) QWERTY
c) INDIAN
d) FRIEND
Answer: a
Clarification: Running key cipher is a type of poly alphabetic substitution which uses tabula recta for making substitutions in the plain text. Using the table we find the plain text to be “SECRET”.

9. Running key cipher is a transposition cipher.
a) true
b) false
Answer: b
Clarification: Running key cipher is a poly alphabetic substitution cipher. Encryption is done by using tabula recta.

10. Running key cipher is a variation of?
a) vigenere cipher
b) autokey cipher
c) hill cipher
d) route cipher

Answer: a
Clarification: Vigenere cipher is a variation of vigenere cipher. The only difference between them is that in vigenere cipher a random key is chosen whereas in running key cipher key is chosen from a book or a text.

11. What will be the ciphered text corresponding to “” if running key cipher is used for encryption with keyword as “ONCEUPONATIME”?
a) GNPJIJBQRR
b) GNPIJJBRRQ
c) GPNJJOBQRR
d) GJJNPOBQRI

Answer: a
Clarification: Encryption in running key cipher takes place exactly as in vigenere cipher if we don’t include the indicator block. So by using the tabula recta we can find the encrypted text which is “GNPJIJBQRR”.

12. What will be the ciphered text corresponding to “ALGORITHM” if running key cipher is used for encryption with keyword as “DATASTRUCTURE”?
a) LDJOZOBBK
b) DLZOJBKBO
c) ZOLDJBKBO
d) OLZBJDKBO

Answer: b
Clarification: Encryption in running key cipher takes place exactly as in vigenere cipher if we don’t include the indicator block. So by using the tabula recta we can find the encrypted text which is “DLZOJBKBO”.

13. What will be the plain text corresponding to cipher text “IWRWHS” if running key cipher is used with keyword as “”?
a) SECRET
b) QWERTY
c) INDIAN
d) FRIEND
Answer: b
Clarification: Running key cipher is a type of poly alphabetic substitution which uses tabula recta for making substitutions in the plain text. Using the table we find the plain text to be “QWERTY”.

Leave a Reply

Your email address will not be published. Required fields are marked *