Computer Networks » Symmetric Key Cryptography
Which of the following is not an alternative name for symmetric key cryptography?

A. Secret key cryptography
B. Public key cryptography
C. Conventional encryption
D. Private key cryptography

Explanation: Cryptography is mainly categorized into two types; symmetric key cryptography and asymmetric key cryptography(public key cryptography). Symmetric key cryptography uses only one key for both encryption and decryption.

What is the cipher text for the text “GREET HER”, if Caesar Cipher is used(key=3)?

A. Kviiy liv
B. Kviix liv
C. Lwjjy mjw
D. Juhhw khu

Explanation: Caesar cipher is the substitution cipher, which belongs to classical cryptography. Cipher text will be obtained by replacing the plain text letters with letters three places further from them. If further letter is ‘z’, then process will circularly follows ‘a’.

What is the cipher text for the message “TAKE ME TO THE PARTY”, id Rail Fence technique is used with two rows?

A. Tkmtteataeeohpry
B. Takemetotheparty
C. Taekmeotthpearyt
D. Yrphoeeataettmkt

Explanation: Rail fence is the transposition technique, that belongs to classical cryptography. First the plain text is written in a sequence of diagonals with defined number of rows, then the cipher text is read off as a sequence of all the rows from starting to end.

What are the two broad categories of symmetric key cryptography?

A. Transposition and substitution
B. Classical and modern
C. Stream and block
D. Classical and block

Explanation: Symmetric key cryptography has two types; classical and modern. Classical cryptography again divided into two types; transposition and substitution. Modern cryptography is of two types; stream cipher and block cipher.

Which of the following algorithm does not belong to symmetric key ciphers?

A. Des
B. Rc4
C. Aes
D. Diffie-hellman

Explanation: Diffie-Hellman is the first asymmetric cipher and well known for its logarithm computations. It is used at its best to transmit the secret key between users for further symmetric encryption of messages.

Which of the following is an advantage of symmetric cipher?

A. (n(n-1))/2 keys are required for n people
B. Sharing secret key over communication channel
C. Brute force attack for small key size
D. Quick encryption and decryption

Explanation: Quick encryption and decryption is done in symmetric key cryptography. Because, it uses less resources and cipher text length will be small or same as plain text. It encrypts huge amount of data quickly and provides confidentiality.

Which of the following is incorrect about symmetric key cryptography?

A. It uses common key for both encryption and decryption
B. It is a secret key cryptography
C. It uses single fixed length key for each algorithm
D. Symmetric key can be combined with asymmetric key to achieve more security

Explanation: An algorithm can make use of number of random keys and the keys can be any size. If the key length is increased, then it will become difficult to crack the key.

Which of the following is a disadvantage of symmetric cipher?

A. Quick encryption
B. Less computational power
C. High level of security
D. Transmission of secret key

Explanation: Symmetric key cryptography uses single key to encrypt and decrypt messages. If the secret key is shared through an unsecured channel, then there will be a chance for attacking the key.

Which of the following is not an application of symmetric encryption algorithms.

A. Data security
B. Cloud storage
C. User privacy
D. Bitcoin’s block chain

Explanation: Unlike data security, cloud storage and user privacy, bitcoin uses elliptic-curve cryptography over symmetric key cryptography. Elliptic curve cryptography not only used for encryption, but also for digital signatures and random generators.

Asymmetric ciphers are complex than symmetric ciphers.

A. True
B. False
C.
D.

Explanation: Asymmetric ciphers are much complex and slower than symmetric ciphers. Asymmetric ciphers have longer keys, which are more related to mathematics. As two keys are employed in asymmetric cipher, it is complex than symmetric ciphers.