# Chandan Rajpurohit

An Artist With Technical Skills

1) What is meant by authentication?

a. Ensuring confidentiality of data.
b. Verifying the identity of the sender.
c. Digitally signing of a document.
d. None of these.

Solution: Authentication refers to the process of verifying the identity of the sender of a message. Hence, the correct option is (b).

2) Consider a mono-alphabetic cipher with the following key value:
(A B C D H G F E I J K L P O N M Q R S T X W V U Y Z)
What will be the encrypted form of the message โV I O L E Tโ ?

a. W I N L H T
b. W K N J H R
c. I O L E T V
d. None of these.

Solution: According to the specified key, the letter โVโ maps to โWโ, โIโ maps to โIโ, โOโ maps to โNโ, โLโ maps to โLโ, โEโ maps to โHโ, and โTโ maps to โTโ. Hence the encrypted form of โVIOLETโ will be โWINLHTโ. Hence, the correct option is (a).

3) For key sizes 128 bits, 192 bits and 256 bits respectively, the number of AES rounds required is

a. 10, 11 and 12
b. 8, 10 and 12
c. 10, 12 and 14
d. 9, 10 and 11

Solution: Follows from the definition of the AES algorithm.

4) For authentication using public-key cryptography, encryption is carried out using

c. Senderโs public key
d. Senderโs private key

Solution: If you want to carry out authentication between a sender A and a receiver B using public-key cryptography, A will encrypt some known message using Aโs private key, so that it can be correctly decrypted by the receiver B using Aโs public key and confirm the source. Hence, the correct option is (d).

5) One weakness of Diffie-Hellman key exchange protocol is

a. It can be easily broken using brute force attack.
b. It is susceptible to man-in-the-middle attack.
c. The key size is small.
d. None of these.