Cryptography in Security set 4

Que.________________ is a cipher formed out of substitution where for a given key-value the cipher alphabet for every plain text remains fixed all through the encryption procedure.
a. Polyalphabetic Cipher
b. Caesar Cipher
c. Playfair Cipher
d. Monoalphabetic Cipher
Que.In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.
a. Rolling Cipher
b. Shift Cipher
c. Playfair Cipher
d. Block Cipher
Que.______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text.
a. Vigenere Cipher
b. Shift Cipher
c. Playfair Cipher
d. Block Cipher
Que.The ________________ has piece of the keyword that has the same length as that of the plaintext.
a. Block Cipher
b. One-time pad
c. Hash functions
d. Vigenere Cipher
Que.In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.
a. Block Cipher
b. One-time pad
c. Hash functions
d. Vigenere Cipher
Que.In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.
a. Block Cipher
b. One-time pad
c. Stream cipher
d. Vigenere Cipher
Que.The procedure to add bits to the last block is termed as _________________
a. decryption
b. hashing
c. tuning
d. padding
Que.Which of the following is not an example of a block cipher?
a. DES
b. IDEA
c. Caesar cipher
d. Twofish
Que.Data Encryption Standard is implemented using the Feistel Cipher which employs 16 round of Feistel structure.
a. DES
b. IDEA
c. Caesar cipher
d. Twofish