Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

The default key size of RC2 Feistel cipher is _______(a) 64GB(b) 64 bits(c) 64 bytes(d) 64KBI have been asked this question in exam.This intriguing question originated from Cryptography in division Number Theory and Cryptography of Discrete Mathematics

Answer»
2.

_______ are used as the base of the Public Key Infrastructure.(a) SSL certificates(b) TLS certificates(c) X.509 certificates(d) HAS certificatesI have been asked this question during an interview.I'd like to ask this question from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics

Answer» CORRECT answer is (c) X.509 certificates

Explanation: The X.509 certificates may be used as a BASE of the PUBLIC Key Infrastructure. PKIX is a tree structure where a Certificate Authority can be used to GIVE trust to end entity certificates. X.509 certificates cannot directly use symmetric cryptography.
3.

Nine’s complement of a number is formed by _________(a) replacing each digit by 9 minus that digit(b) replacing each digit by 1plus that digit(c) replacing each digit by 8 minus that digit(d) None of the mentionedI had been asked this question in an internship interview.My doubt is from Number Theory topic in chapter Number Theory and Cryptography of Discrete Mathematics

Answer»

The CORRECT OPTION is (a) replacing each digit by 9 minus that digit

Explanation: Nine’s COMPLEMENT of a number is FORMED by replacing each digit by 9 minus that digit.

4.

One’s complement of a number x is y, then one’s complement of y is?(a) y(b) x(c) x + y(d) None of the mentionedThis question was addressed to me in class test.The origin of the question is Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics

Answer»

Right option is (B) x

To EXPLAIN I would SAY: Complement of Complement of number GIVES the same number.

5.

In which cipher each letter of the plaintext is substituted by any other letter to form the cipher message?(a) Shift cipher(b) DES encryption(c) Block cipher(d) AES encryptionI have been asked this question in examination.Question is taken from Cryptography topic in portion Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct option is (a) Shift cipher

Easiest explanation: Shift cipher is a mono-alphabetic cipher in which each letter of the plaintext is substituted by another letter to form the ciphertext. It is the simplest form of substitution cipher SCHEME WHEREIN the concept is to replace each alphabet by another alphabet which is ‘shifted’ by some fixed number between 0 and 25. In this scheme, both sender and receiver AGREE on a secret shift number for shifting the alphabet and this number lies between 0 and 25 becomes the key to the encryption. Occasionally, Caesar cipher is used to describe the Shift cipher when the ‘shift of three’ is used.

6.

What is the block size of blowfish block cipher?(a) 64 bits(b) 128 bits(c) 1043 bits(d) 10 bitsI have been asked this question during an interview.My question comes from Cryptography topic in chapter Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct option is (a) 64 BITS

For explanation: Blowfish symmetric block cipher was CREATED after DES but before AES. Its block size is 64 bits, and it can use key lengths from 32 up to 448 bits. It is a 16-round Feistel cipher and unlike in DES it’s S-boxes are key-dependent and so they are GENERATED dynamically.

7.

What type of algorithm does AES encryption use?(a) Stream cipher(b) Symmetric block cipher(c) Asymmetric caesar cipher(d) DES encryptionI have been asked this question in examination.My question is from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics

Answer»

The CORRECT choice is (b) Symmetric block cipher

To elaborate: AES encryption USES symmetric block ciphers to encrypt the messages. It is at least 6 times FASTER than 3 DES. AES uses a substitution-permutation network and this network is a series of operations that either replaces input with output bits (substitution) or shuffles the bits (permutation). It uses 128-bit input PLAINTEXT and it operates on bytes rather than bits. Here, the input is represented as 16 bytes (because 128 bits = 16 bytes) and is arranged in a 4 x 4 MATRIX.

8.

What are the steps in the Feistel function?(a) expansion, mixing, substitution, permutation(b) extract, transform, load(c) extract, load, transform(d) expansion, divide, mixing, permutationI got this question in unit test.This intriguing question originated from Cryptography in division Number Theory and Cryptography of Discrete Mathematics

Answer»

Right choice is (a) expansion, mixing, substitution, permutation

Easy explanation: The Feistel function which occurs in EVERY block has 3 steps

i) Expansion:- The incoming 32-bit block has half of its bits duplicated, making it a 48-bit block.

ii) Mixing:- The new, 48-bit input block is PUT through an XOR gate with this round’s unique subkey.

iii) Substitution:- The MIXED, 48-bit block is divided into 8 6-bit pieces. Each of these 8 pieces is put through an S-block which will output only 4-bits using non-linear-transformation. Permutation: The 32 output bits are then arranged in a SPECIFIC permutation that ensures that they will be distributed among different S-blocks in the NEXT round. This is the most important part of security in DES and it helps to avoid simple, algebra-based attacks.

9.

How many bits are there for random bits and error detection bits in the case of DES block ciphers?(a) 72, 1024(b) 56, 8(c) 104, 45(d) 32, 198The question was posed to me in unit test.This intriguing question originated from Cryptography in division Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct answer is (b) 56, 8

Easy explanation: DES is a symmetric system that uses BLOCK ciphers which CONSIST of 56 random BITS, and 8 more bits are used for error detection. First the data is sent into the system and then divided into two 32-bit blocks. Those two blocks are sent through the entire system using criss-cross which is known as the Feistel system. There are 16 LAYERS in DES. At each layer, one half of the data passes through the Fiestel function and after its completion, it is XORd with the other half of the data. Each layer has its own subkey which is DERIVED from the main 56-bit key by using a key scheduler.

10.

______ uses the concept of pseudo-random sequence.(a) Stream cipher(b) DES encryption(c) Caesar cipher(d) Block cipherThe question was asked in an interview for job.My question is based upon Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics

Answer»

Right option is (a) STREAM cipher

Best explanation: The stream cipher is the one-time pad that uses the XOR function on the plaintext with a pseudo-RANDOM sequence. The input plaintext is encrypted one byte at a time incrementally. As the random sequence is not possible, a pseudo-random sequence is USED. These pseudo-random sequence are the outputs of a generator given an INITIAL SEED which is a number used to initialize a pseudo-random number generator.

11.

Electronic Code Book process is used in ________(a) caesar cipher(b) antisymmetric cipher(c) block cipher(d) stream cipherI got this question in an online interview.The above asked question is from Cryptography in division Number Theory and Cryptography of Discrete Mathematics

Answer» RIGHT answer is (c) BLOCK cipher

Explanation: The block cipher takes a plaintext in the chuck of bits and the bits of key are used to produce bits of CIPHERTEXT. They operate on blocks of bits at a TIME and so it is termed as block ciphers. TIn current cryptomeric systems, the messages that are larger than one block long that need to be SPLIT up into smaller messages by using a process called Electronic Code Book (ECB).
12.

Suppose in order to get a message across enemy lines, we need to choose an initial secret key say, 100110. What will be the decrypted cipher when the original message is 010010011.(a) 110100(b) 1001011(c) 0011010(d) 011011I got this question in examination.I want to ask this question from Cryptography in portion Number Theory and Cryptography of Discrete Mathematics

Answer»
13.

There is no secret key in case of ____________(a) Symmetric ciphers(b) Asymmetric ciphers(c) RSA encryption(d) Alpha-numeric cryptographyI have been asked this question during an internship interview.My query is from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics

Answer» RIGHT answer is (a) Symmetric ciphers

The best explanation: A symmetric algorithm uses the same key to ENCRYPT DATA as WELL as to decrypt data. For example, a symmetric algorithm will use the key to encrypt some plaintext information like a password into a ciphertext. Then, it uses again to TAKE that ciphertext and turn it back into the password.
14.

How many bits of message does the Secure Hash Algorithm produce?(a) 160 bits(b) 1035 bits(c) 621 bits(d) 3761 bitsThis question was addressed to me in a job interview.Question is from Cryptography topic in chapter Number Theory and Cryptography of Discrete Mathematics

Answer»

Correct answer is (a) 160 bits

The best EXPLANATION: The Secure Hash Algorithm or SHAis based on MD4 encryption SYSTEM. This algorithm gives an output of a LONGER 160-bit message that is why it is harder to construct ANOTHER message that yields the same resultant message.

15.

_______ is an example of asymmetric ciphers.(a) Block cipher(b) RSA encryption(c) AES encryption(d) Advanced cryptologyThe question was posed to me in my homework.This question is from Cryptography topic in chapter Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct option is (b) RSA ENCRYPTION

The best I can explain: The asymmetric ciphers use asymmetric ALGORITHMS that use one key to ENCRYPT data and a different key to decrypt ciphers. These algorithms are USED in RSA encryption and public-key cryptography in which the public key is used to encrypt data and the private key is used to decrypt data.

16.

In a transposition cipher, the plaintext is constructed by the ________ of the ciphertext.(a) permutation(b) combination(c) sequence(d) seriesI got this question in an online quiz.Question is from Cryptography in division Number Theory and Cryptography of Discrete Mathematics

Answer»

Correct choice is (a) permutation

Easiest explanation: In CRYPTOGRAPHY, a method of encryption where the positions of plaintext held by units are shifted according to a REGULAR SYSTEM so that the CIPHERTEXT constructs a permutation of the plaintext is TERMED as transposition cipher.

17.

There are 67 people in a company where they are using secret key encryption and decryption system for privacy purpose. Determine the number of secret keys required for this purpose?(a) 887(b) 6529(c) 2211(d) 834The question was posed to me in an online quiz.This intriguing question comes from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics

Answer»

Correct CHOICE is (c) 2211

For explanation: Since every two employee have their own secret key ENCRYPTION and decryption. Both USERS have to agree on a secret key to communicate USING symmetric cryptography. After that, each message is ENCRYPTED with that key it is transmitted and decrypted with the same key. Here, key distribution must be secret. For n = 67 we would need\(\frac{n(n-1)}{2} = \frac{67(67-1)}{2}\) = 2211 keys.

18.

Using RSA algorithm what is the value of cipher test c if the plain text e = 7 and P = 5, q = 16 & n = 832. Determine the Euler’s totient function for the plain text?(a) 47(b) 584(c) 428(d) 60I have been asked this question at a job interview.This key question is from Cryptography in division Number Theory and Cryptography of Discrete Mathematics

Answer»

Right ANSWER is (d) 60

The explanation: Given PLAIN text (m) = 7, P = 5, Q = 16, where P and Q are two prime integer

n = P * Q ⇒ n = 5*16 = 80 ⇒ Z = (P-1)*(Q-1) ⇒ Z = (5-1)*(16-1) = 4*15 = 60.

19.

The public key of given user, in an RSA encryption system is e = 57 and n = 3901. What is the value ofEuler’s totient function ϕ(n) for calculating the private key of the user?(a) 4369(b) 3772(c) 871(d) 7892I have been asked this question in quiz.I want to ask this question from Cryptography topic in portion Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct choice is (B) 3772

To ELABORATE: Given that n=3901 and e=31. We know that n = p∗q where p and q are PRIME numbers, which gives 3901 = 47*83. Now, ϕ(n) is EULER’s totient function i.e., ϕ(n) = (p−1)∗(q−1)

ϕ(n) = (47−1)∗(83−1)

ϕ(n) = 46*82 = 3772.

20.

To encrypt a message _______ is used on the character’s positions.(a) boolean algebra(b) bijective function(c) inverse function(d) surjective functionThis question was posed to me in a job interview.Origin of the question is Cryptography in portion Number Theory and Cryptography of Discrete Mathematics

Answer»

Right answer is (b) bijective function

Best EXPLANATION: We have a mathematical NOTION that a bijective function can be used on the characters’ POSITIONS to ENCRYPT a message and an inverse function is used to decrypt the message.

21.

In a public key system, the cipher text received is C = 10 if RSA encryption used with a public key(e = 11, n = 77) to deduce the plain text. Determine the value of ϕ(n)?(a) 49(b) 60(c) 123(d) 70I got this question at a job interview.My question is based upon Cryptography in portion Number Theory and Cryptography of Discrete Mathematics

Answer»

The CORRECT answer is (B) 60

For explanation: GIVEN n = 77, that means P and q must be 7 and 11 that is they must be co-prime to each other. Now we know that ϕ(n) = (p – 1) (q – 1)

ϕ(n) = (7 – 1) (11 – 1)

ϕ(n) = 6*10

ϕ(n) = 60.

22.

________ can decrypt traffic to make it available to all other network security functions such as web proxies.(a) SSL visibility appliances(b) RSA appliances(c) Rodriguez cipher system(d) Standard cipher systemThis question was addressed to me in class test.This interesting question is from Cryptography in division Number Theory and Cryptography of Discrete Mathematics

Answer»

Right choice is (a) SSL VISIBILITY appliances

To explain: In the data loss prevention SYSTEMS, Web proxies and antivirus network security functions, SSL visibility appliances DECRYPT traffic to make it AVAILABLE for all networks.

23.

The ROT13 caesar cipher system has an offset of ___________(a) 13(b) 45(c) 71(d) 37This question was addressed to me during an online exam.This question is from Cryptography in portion Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct choice is (a) 13

The BEST explanation: The ROT13 CAESAR cipher system has an offset of 13 and it is one of the comprehensive cipher scheme. However, the Vigenere cipher employs Caesar cipher as one ELEMENT of the encryption process.

24.

Suppose that there are two primes, P1 = 229 and p2 = 61. Find the value of z and Φ.(a) 13969, 13680(b) 5853, 23452(c) 7793, 34565(d) 17146, 69262This question was addressed to me in homework.I'm obligated to ask this question of Cryptography topic in portion Number Theory and Cryptography of Discrete Mathematics

Answer»

Right option is (a) 13969, 13680

Easy EXPLANATION: We know that, Z = P1*p2 = 229*61 = 13969 and Φ = (p1 – 1)(p2 – 1) = (229 – 1)(61 – 1) = 228*60 = 13680.

25.

What is the block size of RC6 Feistel block cipher?(a) 5013 bits(b) 128 bits(c) 596 bits(d) 1768 bitsThe question was asked by my school teacher while I was bunking the class.My question is taken from Cryptography in section Number Theory and Cryptography of Discrete Mathematics

Answer»

Right option is (b) 128 BITS

For explanation: The RC6 Feistel block CIPHER is a 20-round cipher scheme which includes a fixed block SIZE of 128 bits and it supports 128, 192, and 256-bit keys for ENCRYPTION of messages.

26.

How many combinations of keys can be constructed from a 72 ciphertext stream cipher?(a) 4271(b) 7345(c) 3291(d) 2556The question was asked at a job interview.Asked question is from Cryptography in chapter Number Theory and Cryptography of Discrete Mathematics

Answer» CORRECT answer is (d) 2556

For EXPLANATION: For stream cipher, if there are N ciphertexts then there are n*(n−1)/2 combination of KEYS to be made.

= \(72*\frac{72-1}{2}\)

= 72*35.5

= 2556.
27.

In encryption, which of the following is the best text encoding technique?(a) ASCII encoding(b) Hex-encoding(c) Unicode technique(d) Base64 encodingThe question was posed to me in an interview for internship.I need to ask this question from Cryptography in portion Number Theory and Cryptography of Discrete Mathematics

Answer»

Correct option is (C) Unicode technique

Best EXPLANATION: BASE64 and hex encoding scheme encode characters(or only bytes). First, we need to encode the characters as bytes and after that encode the bytes. In TERMS of compactness and simplicity, the best technique is Unicode scheme.

28.

Let A’s public key is n=6, 736, 180, 7817, 961, 456, 267 and e = 5 and B sends the ciphertext. c = 456, 871, 122, 391, 882, 538 to A. Determine B’s message in numeric format?(a) 235813(b) 57971.89(c) 770190.04(d) 687651.9This question was posed to me by my college director while I was bunking the class.This interesting question is from Cryptography topic in division Number Theory and Cryptography of Discrete Mathematics

Answer»

Correct option is (c) 770190.04

The best explanation: It is known that to GET original MESSAGE m after decrypting we can have the formulam=c1/e. In this case: (456,871,122,391,882,538)^1/3 = 770190.04 and this is the REQUIRED answer.

29.

TEA cipher uses which of the following structure?(a) standard cipher structure(b) pseudo random structure(c) feistel structure(d) block structureThis question was addressed to me in an online quiz.Origin of the question is Cryptography in portion Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct ANSWER is (c) feistel STRUCTURE

The explanation: The Feistel structure system TEA OPERATES on two 32-bit unsigned integer numbers. It uses a 128-bit key that can be USED to BUILD a simple key schedule by mixing all of the key elements.

30.

If there are 2^56 cipher texts per plain text and a total of 2^18 plaintexts of length 18 exists. Then determine the number of distinct ciphertexts?(a) 761(b) 2^74(c) 186(d) 2^89I got this question in an internship interview.This intriguing question comes from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics

Answer»

Right choice is (b) 2^74

To elaborate: If there are 2^56 cipher TEXTS per plain text and a total of 2^18 plaintexts of length 18 EXISTS which will all decrypt to the same plaintext, and this HOLDS for EVERY plaintext. There are a total of 2^56plaintexts of length 56. Now, there must be 2^56. 2^18 = 2^74 distinct ciphertexts which all decrypt to plaintexts of length 56. If all those ciphertexts are the same length, they must be at least 74 bits long.

31.

In cryptography system, the value of z in x ≡ z^e (mod m) should be at least ______(a) 1024 bits(b) 1GB(c) 596 bits(d) 54 BytesI had been asked this question in homework.This intriguing question comes from Number Theory topic in chapter Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct answer is (a) 1024 BITS

For explanation: In CRYPTOGRAPHY system, the value of z in x ≡ z^e (MOD m) should be at least 1024 bits.

32.

How many bytes of the secret key is generated using Diffie-Hellman encryption/decryption scheme?(a) 256(b) 871(c) 1024(d) 962The question was asked in an interview.I would like to ask this question from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics

Answer» CORRECT option is (a) 256

To explain I would SAY: Diffie-Hellman encryption/decryption scheme GENERATES 256 bytes SHARED a secret key. This secret key then is used by AES key to ENCRYPT this data.
33.

In which of the following systems, encryption slower than decryption?(a) elliptic curve cryptography(b) parabolic curve cryptography(c) symmetric cryptography(d) antisymmetric cryptographyThe question was asked in an internship interview.My question is taken from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics

Answer»
34.

Determine the value of x, where y = 7, e = 12 and n = 566 using modular exponentiation method (x ≡ y^e (mod n)).(a) 735(b) 321(c) 872(d) 487The question was posed to me in an interview.My question is based upon Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics

Answer» CORRECT OPTION is (d) 487

Explanation: Given y = 5, e = 12, and n = 566 and so x ≡ 512 (mod 566). Now 512 comes out to 244140625 and TAKING this value modulo 566, x is determined to be 487.
35.

According to congruence relation, find the remainder of 56 mod 24.(a) 10(b) 12(c) 6(d) 4I have been asked this question in an interview for internship.My doubt is from Number Theory in division Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct OPTION is (C) 6

Easiest explanation: According to CONGRUENCE relation, 56 ≡ 6 (mod 24), because 56 − 32 = 24, which is a multiple of 24. So, the remainder is 6.

36.

The time complexity to perform the modular exponentiation of a ≡ c^g (mod m).(a) O(m+a)(b) O(a*g)(c) O(gm)(d) O(g)I got this question in homework.Query is from Number Theory topic in portion Number Theory and Cryptography of Discrete Mathematics

Answer»

The CORRECT option is (d) O(g)

For explanation I would say: The modular EXPONENTIATION completely depends on the operating SYSTEM environment and the PROCESSOR for its performance. The above said method REQUIRES a time complexity of O(g) for its completion.

37.

Evaluate the expression 6359 mod 320.(a) 681(b) 811(c) 3781(d) 279The question was posed to me during an internship interview.Asked question is from Number Theory topic in portion Number Theory and Cryptography of Discrete Mathematics

Answer» CORRECT answer is (d) 279

Best explanation: By DEFINITION, we can have 6359 ≡ 279 (mod320), hence the answer is 279.
38.

If there is a unique prime number p1 then a finite field F has the property of ______________(a) p1x = 0 for all x in F(b) f(x) = f(xp1) for all x in F(c) p1 = y for all y in F(d) xy + p1 for all x, y in FI have been asked this question during an interview for a job.This is a very interesting question from Number Theory topic in section Number Theory and Cryptography of Discrete Mathematics

Answer»

Correct answer is (a) p1x = 0 for all x in F

To elaborate: A field can be DEFINED as an ALGEBRAIC structure in which multiplication, ADDITION, subtraction, and division are well-defined and satisfy similar PROPERTIES. If there is a unique PRIME number p1 then a finite field F has the property of p1x = 0, for all x in F and this prime number is called the characteristics of the field.

39.

Which of the following methods uses the concept that exponentiation is computationally inexpensive in the finite field?(a) Diffie-HEllman key exchange(b) RSA key exchange(c) Arithmetic key exchange(d) FSM methodI had been asked this question during an interview.The above asked question is from Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct choice is (a) Diffie-HEllman KEY exchange

Explanation: Exponentiation in the finite fields has its MANY applications in the public key CRYPTOGRAPHY system. Now, the Diffie–Hellman key exchange can have the concept that exponentiation is COMPUTATIONALLY inexpensive in the finite fields and the discrete logarithm which is the inverse of exponentiation, can be computationally EXPENSIVE.

40.

Which of the following algorithms has better computational complexity than standard division algorithms?(a) Montgomery algorithm(b) Classical modular exponentiation algorithm(c) ASM algorithm(d) FSM algorithmI got this question in an international level competition.I need to ask this question from Number Theory in division Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct answer is (b) Classical modular exponentiation algorithm

The best I can explain: To MULTIPLY m and N, they are CONVERTED to Montgomery form: mR mod X and nR mod X. When multiplied, these produce mnR^2 mod X, and the Montgomery reduction produces abR mod N which is the Montgomery form of the desired product. After that, the low bits are DISCARDED which gives a result less than 2X. One final subtraction reduces this to less than X. Hence, this procedure can have a better computational complexity than standard division algorithms.

41.

A multiplicative monoid defines the property of exponentiation with ________(a) integer exponents(b) fractional exponents(c) rational exponents(d) negative integer exponentsI had been asked this question in homework.This interesting question is from Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics

Answer»

The correct choice is (a) integer exponents

Explanation: Exponentiation with integer exponents is termed in any multiplicative MONOID. Exponentiation is described INDUCTIVELY by 1) h^0 = 1 for all h ∈ S, h^n+1 = h^n h and non-negative INTEGERS n, If n is a negative integer then h^n is only defined if h has an inverse in S. Monoids define many STRUCTURES including GROUPS and rings (under multiplication).

42.

If the multiplicative inverse of “53 modulo 21” exists, then which of the following is true?(a) GCD(53,21) = 1(b) GCD(53,21) = 29(c) GCD(53,21) = 53(d) GCD(53,21) = 12This question was posed to me by my school principal while I was bunking the class.My query is from Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics

Answer»

The CORRECT choice is (a) GCD(53,21) = 1

Easy EXPLANATION: The MULTIPLICATIVE inverse of “a modulo m” can be found out by extended Euler’s GCD algorithm, and the time complexity of this method is O(LOGM). We know that the multiplicative inverse of “x modulo n” exists if and only if x and n are relatively PRIME (i.e., if gcd(a, m) = 1). So, in this case GCD(53,21) = 1.

43.

The least common multiple of 41.42 and 42.41 is ____________(a) 42(b) 41(c) 84(d) 41.42I have been asked this question by my school principal while I was bunking the class.Question is taken from Number Theory in section Number Theory and Cryptography of Discrete Mathematics

Answer»

Correct option is (d) 41.42

For EXPLANATION: LCM(41 * 42, 42 * 42) = 41.42.42.41 / 41.42 = 41.42.

44.

The lcm of 3 and 21 is ________ if gcd(3,21)=3.(a) 3(b) 12(c) 21(d) 42The question was posed to me during a job interview.This is a very interesting question from Number Theory in section Number Theory and Cryptography of Discrete Mathematics

Answer» CORRECT OPTION is (C) 21

For explanation: 3 * lcm(3, 21) = 63 HENCE, lcm(3, 21) = 63 / 3 = 21.
45.

The greatest common divisor of 0 and 5 is ___________(a) 0(b) 1(c) 2(d) 5I had been asked this question in an online interview.The doubt is from Number Theory topic in chapter Number Theory and Cryptography of Discrete Mathematics

Answer»

The CORRECT CHOICE is (b) 1

The EXPLANATION is: gcd(0, 5) = 0^min(1, 0).5^min(0, 1).

46.

The greatest common divisor of 3^13.5^17 and 2^12.3^5 is __________(a) 3^0(b) 3^1(c) 3^3(d) 3^5This question was posed to me by my school teacher while I was bunking the class.My question is based upon Number Theory in section Number Theory and Cryptography of Discrete Mathematics

Answer»

Correct ANSWER is (d) 3^5

To explain: GCD(a, b) = 3^min(13, 5).5^min(17, 0).2^min(12, 0).

47.

Is 7, 8, 9, 11 are pairwise relatively prime.(a) True(b) FalseThis question was addressed to me during an online exam.I'd like to ask this question from Number Theory in division Number Theory and Cryptography of Discrete Mathematics

Answer» RIGHT CHOICE is (a) True

For explanation I would say: gcd(7, 9) = gcd(8, 9) = gcd(9, 11) = gcd(11, 7) = 1. The numbers 7 and 11 are prime and numbers 8 and 9 are relatively prime.
48.

Which positive integer less than 21 are relatively prime to 21?(a) 18(b) 19(c) 21(d) 24This question was posed to me by my school principal while I was bunking the class.Asked question is from Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics

Answer» CORRECT choice is (b) 19

The BEST I can EXPLAIN: gcd(19,21) = 1. According to the definition of RELATIVELY prime gcd of two numbers is 1.
49.

The prime factorization of 1001 is __________(a) 7^3.11.13(b) 7^2.11.13(c) 7.11.13(d) 7.11^3.13The question was asked during an online interview.This intriguing question comes from Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics

Answer» RIGHT option is (C) 7.11.13

The explanation: PERFORM successive division beginning with 2.
50.

Out of the following which of these integers is not prime?(a) 21(b) 35(c) 71(d) 101The question was asked in class test.This interesting question is from Number Theory in division Number Theory and Cryptography of Discrete Mathematics

Answer»

Right OPTION is (b) 35

Explanation: 35 = 5.7 which is the PRODUCT of TWO prime NUMBERS.