1. Cryptosystems are used for
A. Privacy
B. Authentication
C. Privacy & Authentication
D. None of the mentioned
2. The key also contains a
A. Plaintext
B. Ciphertext
C. Plaintext & Ciphertext
D. None of the mentioned
3. The system which has insufficient information available to crypt-analyst is
A. One-time pad
B. Unconditionally secure
C. One-time pad & Unconditionally secure
D. None of the mentioned
4. Caesar’s cipher was a monoalphabetic cipher.
A. True
B. False
5. In Caesar cipher, each plain text is replaced by
A. Alphabet shift
B. Numerals
C. Symbols
D. None of the mentioned
6. The trithemius cipher is a mono alphabetical cipher.
A. True
B. False
7. In the auto key method
A. Feedback is necessary
B. Feedback is not necessary
C. Can be either necessary or not
D. None of the mentioned
8. In the Vigenere method ______ is provided.
A. Priming key
B. Feedback
C. Priming key & Feedback
D. None of the mentioned
9. A cipher system is said to have perfect secrecy if
A. Posteriori probability is equal to the prior probability
B. Posteriori probability is greater than the prior probability
C. Posteriori probability is less than the prior probability
D. None of the mentioned
10. The conditions for perfect secrecy are
A. Only one key transforming message should exist
B. All keys should be equally likely
C. One key transforming message to each cipher text & all keys should be equally likely
D. None of the mentioned