Which of the following statements about cryptography are true and which are false?. True B The secret key cryptography transforms the plaintext, to ciphertext, by an input secret key and
Trang 1ACCP i10 SEMESTER 2 APJ-II – Advanced Programming in Java - II
MODULAR QUIZ
FOR Module 5 – Crytography
1. Which of the following statements about cryptography are true and which are false ?
(A) The Tamper-proofing process verifies whether the data received by the
receiver is the same data as sent by the sender
True
(B) The secret key cryptography transforms the plaintext, to ciphertext, by an
input secret key and decrypted by another output secret key False (C) Spoofing or identity interception, which means impersonating the identity of
a different user and use it in an unauthorized way
True
(D) Authentication is the process that provides tamper-proofing, while it is on the
(E) Hash functions or message digests are algorithms that use no key for data
encryption
True
2. Which of the following statements about selectors are true and which are false?
(A) The Java Cryptography Extension (JCE) defines a Java class for each service
class like HessageDigest, signature, and KeyPairGenerator
False
(B) The message digest class is used to calculate the message digest or hash
(C) The Java Cryptography Architecture (JCA) is a Java framework to access and
develop cryptographic functionality, and forms part of the Java security API
True
(D) Cryptography service provider provides implementation independence and
interoperability in order to implement the cryptographic concepts
True
(E) The Keystore class specifies the fUnctionality shared by all opaque key
objects
False
3. Can you match the properties with the corresponding descriptions?
A. Provides the classes and interfaces to perform
cryptographic operations
(1) Symmetric block encryption
B. Uses a small piece of information to authenticate
a message
(2) JCE
C. Applies an encryption key to every single bit
present in an input stream of plaintext
(3) javax.cryto
D. Divides the input stream into fixed-size chunks (4) MAC
Trang 2and an encryption key is applied to each chunk
E. Extends the underlying architecture of JCA
framework to implement encryption and key
exchange
(5) Symmetric stream encryption
Answer : A-3; B-4; C-5; D-1; E-2
4. Which of the following statements about Cipher class and encryption are true and which are false?
(D) The method getInstance() initialises a Cipher class instance False (E) The update () method is used to encrypt and decrypt data in multiple steps True
5. Can you arrange the steps for creating a cipher for encrypting data using password (assuming appropriate variables and instances are declared already?)
(A) PBEKeySpec pbeks = new PBEKeySpec (password.toCharArray());
(B) SecretKeyFactory skf1 =
(C) SecureRandom sr = SecureRandom.getInstance(“SHA1PRNG”);
(D) PBEParaneterSpec pbeps = new PBEParanieterSpec(salt, 200);
(E) Cipher cip = Cipher.getInstance(“PBEWithMD5AndTrip1eDES”);
Answer : E-A-B-D-C