

InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
1. |
The default key size of RC2 Feistel cipher is _______(a) 64GB(b) 64 bits(c) 64 bytes(d) 64KBI have been asked this question in exam.This intriguing question originated from Cryptography in division Number Theory and Cryptography of Discrete Mathematics |
Answer» | |
2. |
_______ are used as the base of the Public Key Infrastructure.(a) SSL certificates(b) TLS certificates(c) X.509 certificates(d) HAS certificatesI have been asked this question during an interview.I'd like to ask this question from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics |
Answer» CORRECT answer is (c) X.509 certificates Explanation: The X.509 certificates may be used as a BASE of the PUBLIC Key Infrastructure. PKIX is a tree structure where a Certificate Authority can be used to GIVE trust to end entity certificates. X.509 certificates cannot directly use symmetric cryptography. |
|
3. |
Nine’s complement of a number is formed by _________(a) replacing each digit by 9 minus that digit(b) replacing each digit by 1plus that digit(c) replacing each digit by 8 minus that digit(d) None of the mentionedI had been asked this question in an internship interview.My doubt is from Number Theory topic in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» The CORRECT OPTION is (a) replacing each digit by 9 minus that digit |
|
4. |
One’s complement of a number x is y, then one’s complement of y is?(a) y(b) x(c) x + y(d) None of the mentionedThis question was addressed to me in class test.The origin of the question is Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» Right option is (B) x |
|
5. |
In which cipher each letter of the plaintext is substituted by any other letter to form the cipher message?(a) Shift cipher(b) DES encryption(c) Block cipher(d) AES encryptionI have been asked this question in examination.Question is taken from Cryptography topic in portion Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct option is (a) Shift cipher |
|
6. |
What is the block size of blowfish block cipher?(a) 64 bits(b) 128 bits(c) 1043 bits(d) 10 bitsI have been asked this question during an interview.My question comes from Cryptography topic in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct option is (a) 64 BITS |
|
7. |
What type of algorithm does AES encryption use?(a) Stream cipher(b) Symmetric block cipher(c) Asymmetric caesar cipher(d) DES encryptionI have been asked this question in examination.My question is from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics |
Answer» The CORRECT choice is (b) Symmetric block cipher |
|
8. |
What are the steps in the Feistel function?(a) expansion, mixing, substitution, permutation(b) extract, transform, load(c) extract, load, transform(d) expansion, divide, mixing, permutationI got this question in unit test.This intriguing question originated from Cryptography in division Number Theory and Cryptography of Discrete Mathematics |
Answer» Right choice is (a) expansion, mixing, substitution, permutation |
|
9. |
How many bits are there for random bits and error detection bits in the case of DES block ciphers?(a) 72, 1024(b) 56, 8(c) 104, 45(d) 32, 198The question was posed to me in unit test.This intriguing question originated from Cryptography in division Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct answer is (b) 56, 8 |
|
10. |
______ uses the concept of pseudo-random sequence.(a) Stream cipher(b) DES encryption(c) Caesar cipher(d) Block cipherThe question was asked in an interview for job.My question is based upon Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics |
Answer» Right option is (a) STREAM cipher |
|
11. |
Electronic Code Book process is used in ________(a) caesar cipher(b) antisymmetric cipher(c) block cipher(d) stream cipherI got this question in an online interview.The above asked question is from Cryptography in division Number Theory and Cryptography of Discrete Mathematics |
Answer» RIGHT answer is (c) BLOCK cipher Explanation: The block cipher takes a plaintext in the chuck of bits and the bits of key are used to produce bits of CIPHERTEXT. They operate on blocks of bits at a TIME and so it is termed as block ciphers. TIn current cryptomeric systems, the messages that are larger than one block long that need to be SPLIT up into smaller messages by using a process called Electronic Code Book (ECB). |
|
12. |
Suppose in order to get a message across enemy lines, we need to choose an initial secret key say, 100110. What will be the decrypted cipher when the original message is 010010011.(a) 110100(b) 1001011(c) 0011010(d) 011011I got this question in examination.I want to ask this question from Cryptography in portion Number Theory and Cryptography of Discrete Mathematics |
Answer» | |
13. |
There is no secret key in case of ____________(a) Symmetric ciphers(b) Asymmetric ciphers(c) RSA encryption(d) Alpha-numeric cryptographyI have been asked this question during an internship interview.My query is from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics |
Answer» RIGHT answer is (a) Symmetric ciphers The best explanation: A symmetric algorithm uses the same key to ENCRYPT DATA as WELL as to decrypt data. For example, a symmetric algorithm will use the key to encrypt some plaintext information like a password into a ciphertext. Then, it uses again to TAKE that ciphertext and turn it back into the password. |
|
14. |
How many bits of message does the Secure Hash Algorithm produce?(a) 160 bits(b) 1035 bits(c) 621 bits(d) 3761 bitsThis question was addressed to me in a job interview.Question is from Cryptography topic in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» Correct answer is (a) 160 bits |
|
15. |
_______ is an example of asymmetric ciphers.(a) Block cipher(b) RSA encryption(c) AES encryption(d) Advanced cryptologyThe question was posed to me in my homework.This question is from Cryptography topic in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct option is (b) RSA ENCRYPTION |
|
16. |
In a transposition cipher, the plaintext is constructed by the ________ of the ciphertext.(a) permutation(b) combination(c) sequence(d) seriesI got this question in an online quiz.Question is from Cryptography in division Number Theory and Cryptography of Discrete Mathematics |
Answer» Correct choice is (a) permutation |
|
17. |
There are 67 people in a company where they are using secret key encryption and decryption system for privacy purpose. Determine the number of secret keys required for this purpose?(a) 887(b) 6529(c) 2211(d) 834The question was posed to me in an online quiz.This intriguing question comes from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics |
Answer» Correct CHOICE is (c) 2211 |
|
18. |
Using RSA algorithm what is the value of cipher test c if the plain text e = 7 and P = 5, q = 16 & n = 832. Determine the Euler’s totient function for the plain text?(a) 47(b) 584(c) 428(d) 60I have been asked this question at a job interview.This key question is from Cryptography in division Number Theory and Cryptography of Discrete Mathematics |
Answer» Right ANSWER is (d) 60 |
|
19. |
The public key of given user, in an RSA encryption system is e = 57 and n = 3901. What is the value ofEuler’s totient function ϕ(n) for calculating the private key of the user?(a) 4369(b) 3772(c) 871(d) 7892I have been asked this question in quiz.I want to ask this question from Cryptography topic in portion Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct choice is (B) 3772 |
|
20. |
To encrypt a message _______ is used on the character’s positions.(a) boolean algebra(b) bijective function(c) inverse function(d) surjective functionThis question was posed to me in a job interview.Origin of the question is Cryptography in portion Number Theory and Cryptography of Discrete Mathematics |
Answer» Right answer is (b) bijective function |
|
21. |
In a public key system, the cipher text received is C = 10 if RSA encryption used with a public key(e = 11, n = 77) to deduce the plain text. Determine the value of ϕ(n)?(a) 49(b) 60(c) 123(d) 70I got this question at a job interview.My question is based upon Cryptography in portion Number Theory and Cryptography of Discrete Mathematics |
Answer» The CORRECT answer is (B) 60 |
|
22. |
________ can decrypt traffic to make it available to all other network security functions such as web proxies.(a) SSL visibility appliances(b) RSA appliances(c) Rodriguez cipher system(d) Standard cipher systemThis question was addressed to me in class test.This interesting question is from Cryptography in division Number Theory and Cryptography of Discrete Mathematics |
Answer» Right choice is (a) SSL VISIBILITY appliances |
|
23. |
The ROT13 caesar cipher system has an offset of ___________(a) 13(b) 45(c) 71(d) 37This question was addressed to me during an online exam.This question is from Cryptography in portion Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct choice is (a) 13 |
|
24. |
Suppose that there are two primes, P1 = 229 and p2 = 61. Find the value of z and Φ.(a) 13969, 13680(b) 5853, 23452(c) 7793, 34565(d) 17146, 69262This question was addressed to me in homework.I'm obligated to ask this question of Cryptography topic in portion Number Theory and Cryptography of Discrete Mathematics |
Answer» Right option is (a) 13969, 13680 |
|
25. |
What is the block size of RC6 Feistel block cipher?(a) 5013 bits(b) 128 bits(c) 596 bits(d) 1768 bitsThe question was asked by my school teacher while I was bunking the class.My question is taken from Cryptography in section Number Theory and Cryptography of Discrete Mathematics |
Answer» Right option is (b) 128 BITS |
|
26. |
How many combinations of keys can be constructed from a 72 ciphertext stream cipher?(a) 4271(b) 7345(c) 3291(d) 2556The question was asked at a job interview.Asked question is from Cryptography in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» CORRECT answer is (d) 2556 For EXPLANATION: For stream cipher, if there are N ciphertexts then there are n*(n−1)/2 combination of KEYS to be made. = \(72*\frac{72-1}{2}\) = 72*35.5 = 2556. |
|
27. |
In encryption, which of the following is the best text encoding technique?(a) ASCII encoding(b) Hex-encoding(c) Unicode technique(d) Base64 encodingThe question was posed to me in an interview for internship.I need to ask this question from Cryptography in portion Number Theory and Cryptography of Discrete Mathematics |
Answer» Correct option is (C) Unicode technique |
|
28. |
Let A’s public key is n=6, 736, 180, 7817, 961, 456, 267 and e = 5 and B sends the ciphertext. c = 456, 871, 122, 391, 882, 538 to A. Determine B’s message in numeric format?(a) 235813(b) 57971.89(c) 770190.04(d) 687651.9This question was posed to me by my college director while I was bunking the class.This interesting question is from Cryptography topic in division Number Theory and Cryptography of Discrete Mathematics |
Answer» Correct option is (c) 770190.04 |
|
29. |
TEA cipher uses which of the following structure?(a) standard cipher structure(b) pseudo random structure(c) feistel structure(d) block structureThis question was addressed to me in an online quiz.Origin of the question is Cryptography in portion Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct ANSWER is (c) feistel STRUCTURE |
|
30. |
If there are 2^56 cipher texts per plain text and a total of 2^18 plaintexts of length 18 exists. Then determine the number of distinct ciphertexts?(a) 761(b) 2^74(c) 186(d) 2^89I got this question in an internship interview.This intriguing question comes from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics |
Answer» Right choice is (b) 2^74 |
|
31. |
In cryptography system, the value of z in x ≡ z^e (mod m) should be at least ______(a) 1024 bits(b) 1GB(c) 596 bits(d) 54 BytesI had been asked this question in homework.This intriguing question comes from Number Theory topic in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct answer is (a) 1024 BITS |
|
32. |
How many bytes of the secret key is generated using Diffie-Hellman encryption/decryption scheme?(a) 256(b) 871(c) 1024(d) 962The question was asked in an interview.I would like to ask this question from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics |
Answer» CORRECT option is (a) 256 To explain I would SAY: Diffie-Hellman encryption/decryption scheme GENERATES 256 bytes SHARED a secret key. This secret key then is used by AES key to ENCRYPT this data. |
|
33. |
In which of the following systems, encryption slower than decryption?(a) elliptic curve cryptography(b) parabolic curve cryptography(c) symmetric cryptography(d) antisymmetric cryptographyThe question was asked in an internship interview.My question is taken from Cryptography topic in section Number Theory and Cryptography of Discrete Mathematics |
Answer» | |
34. |
Determine the value of x, where y = 7, e = 12 and n = 566 using modular exponentiation method (x ≡ y^e (mod n)).(a) 735(b) 321(c) 872(d) 487The question was posed to me in an interview.My question is based upon Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» CORRECT OPTION is (d) 487 Explanation: Given y = 5, e = 12, and n = 566 and so x ≡ 512 (mod 566). Now 512 comes out to 244140625 and TAKING this value modulo 566, x is determined to be 487. |
|
35. |
According to congruence relation, find the remainder of 56 mod 24.(a) 10(b) 12(c) 6(d) 4I have been asked this question in an interview for internship.My doubt is from Number Theory in division Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct OPTION is (C) 6 |
|
36. |
The time complexity to perform the modular exponentiation of a ≡ c^g (mod m).(a) O(m+a)(b) O(a*g)(c) O(gm)(d) O(g)I got this question in homework.Query is from Number Theory topic in portion Number Theory and Cryptography of Discrete Mathematics |
Answer» The CORRECT option is (d) O(g) |
|
37. |
Evaluate the expression 6359 mod 320.(a) 681(b) 811(c) 3781(d) 279The question was posed to me during an internship interview.Asked question is from Number Theory topic in portion Number Theory and Cryptography of Discrete Mathematics |
Answer» CORRECT answer is (d) 279 Best explanation: By DEFINITION, we can have 6359 ≡ 279 (mod320), hence the answer is 279. |
|
38. |
If there is a unique prime number p1 then a finite field F has the property of ______________(a) p1x = 0 for all x in F(b) f(x) = f(xp1) for all x in F(c) p1 = y for all y in F(d) xy + p1 for all x, y in FI have been asked this question during an interview for a job.This is a very interesting question from Number Theory topic in section Number Theory and Cryptography of Discrete Mathematics |
Answer» Correct answer is (a) p1x = 0 for all x in F |
|
39. |
Which of the following methods uses the concept that exponentiation is computationally inexpensive in the finite field?(a) Diffie-HEllman key exchange(b) RSA key exchange(c) Arithmetic key exchange(d) FSM methodI had been asked this question during an interview.The above asked question is from Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct choice is (a) Diffie-HEllman KEY exchange |
|
40. |
Which of the following algorithms has better computational complexity than standard division algorithms?(a) Montgomery algorithm(b) Classical modular exponentiation algorithm(c) ASM algorithm(d) FSM algorithmI got this question in an international level competition.I need to ask this question from Number Theory in division Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct answer is (b) Classical modular exponentiation algorithm |
|
41. |
A multiplicative monoid defines the property of exponentiation with ________(a) integer exponents(b) fractional exponents(c) rational exponents(d) negative integer exponentsI had been asked this question in homework.This interesting question is from Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» The correct choice is (a) integer exponents |
|
42. |
If the multiplicative inverse of “53 modulo 21” exists, then which of the following is true?(a) GCD(53,21) = 1(b) GCD(53,21) = 29(c) GCD(53,21) = 53(d) GCD(53,21) = 12This question was posed to me by my school principal while I was bunking the class.My query is from Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» The CORRECT choice is (a) GCD(53,21) = 1 |
|
43. |
The least common multiple of 41.42 and 42.41 is ____________(a) 42(b) 41(c) 84(d) 41.42I have been asked this question by my school principal while I was bunking the class.Question is taken from Number Theory in section Number Theory and Cryptography of Discrete Mathematics |
Answer» Correct option is (d) 41.42 |
|
44. |
The lcm of 3 and 21 is ________ if gcd(3,21)=3.(a) 3(b) 12(c) 21(d) 42The question was posed to me during a job interview.This is a very interesting question from Number Theory in section Number Theory and Cryptography of Discrete Mathematics |
Answer» CORRECT OPTION is (C) 21 For explanation: 3 * lcm(3, 21) = 63 HENCE, lcm(3, 21) = 63 / 3 = 21. |
|
45. |
The greatest common divisor of 0 and 5 is ___________(a) 0(b) 1(c) 2(d) 5I had been asked this question in an online interview.The doubt is from Number Theory topic in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» The CORRECT CHOICE is (b) 1 |
|
46. |
The greatest common divisor of 3^13.5^17 and 2^12.3^5 is __________(a) 3^0(b) 3^1(c) 3^3(d) 3^5This question was posed to me by my school teacher while I was bunking the class.My question is based upon Number Theory in section Number Theory and Cryptography of Discrete Mathematics |
Answer» Correct ANSWER is (d) 3^5 |
|
47. |
Is 7, 8, 9, 11 are pairwise relatively prime.(a) True(b) FalseThis question was addressed to me during an online exam.I'd like to ask this question from Number Theory in division Number Theory and Cryptography of Discrete Mathematics |
Answer» RIGHT CHOICE is (a) True For explanation I would say: gcd(7, 9) = gcd(8, 9) = gcd(9, 11) = gcd(11, 7) = 1. The numbers 7 and 11 are prime and numbers 8 and 9 are relatively prime. |
|
48. |
Which positive integer less than 21 are relatively prime to 21?(a) 18(b) 19(c) 21(d) 24This question was posed to me by my school principal while I was bunking the class.Asked question is from Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» CORRECT choice is (b) 19 The BEST I can EXPLAIN: gcd(19,21) = 1. According to the definition of RELATIVELY prime gcd of two numbers is 1. |
|
49. |
The prime factorization of 1001 is __________(a) 7^3.11.13(b) 7^2.11.13(c) 7.11.13(d) 7.11^3.13The question was asked during an online interview.This intriguing question comes from Number Theory in chapter Number Theory and Cryptography of Discrete Mathematics |
Answer» RIGHT option is (C) 7.11.13 The explanation: PERFORM successive division beginning with 2. |
|
50. |
Out of the following which of these integers is not prime?(a) 21(b) 35(c) 71(d) 101The question was asked in class test.This interesting question is from Number Theory in division Number Theory and Cryptography of Discrete Mathematics |
Answer» Right OPTION is (b) 35 |
|