Hello Peers, Today we are going to share** all week’s assessment and quizzes answers** of the **Symmetric Cryptography **course launched by **Coursera **totally **free of cost**âś…âś…âś…. This is a** certification course** for every interested student.

In case you didn’t find this course for free, then you can** apply for financial ads** to get this course for totally free.

*Check out this article – “How to Apply for Financial Ads?”*

**About The Coursera**

**Coursera**, **India’s biggest learning platform** launched millions of free courses for students daily. These courses are from various recognized universities, where industry experts and professors teach in a very well manner and in a more understandable way.

Here, you will find ** Symmetric Cryptography Exam Answers** in

**Bold Color**which are given below.

These answers are updated recently and are **100% correctâś…** answers of all week, assessment, and final exam answers of **Symmetric Cryptography **from **Coursera Free Certification Course.**

Use â€śCtrl+Fâ€ť To Find Any Questions Answer. & For Mobile User, You Just Need To Click On Three dots In Your Browser & You Will Get A â€śFindâ€ť Option There. Use These Option to Get Any Random Questions Answer.

**About Symmetric Cryptography Course**

Hello, and welcome to **Symmetric Cryptography**!

Symmetric cryptography uses a shared secret key to keep messages private, so that attackers who don’t have the key can’t read them. The course talks about substitution and transposition, which were the foundations of classical cryptography when the message was encoded in natural language like English. Then, we build on product **cyphers **(which use both substitution and transposition/permutation) to talk about modern block cyphers and go over the algorithms used in DES, 3-DES, and AES, which are the most common ones. Lastly, we add different modes of block cipher operations in** ECB, CBC, CFB, OFB, and CTR** modes to allow block ciphers to work with data of different lengths.

This course is part of both the Applied Cryptography specialization and the **Introduction to Applied Cryptography specialization**, so it is listed in both.

**This course is part of a few different plans.**This course can be used for more than one Specialization or Professional Certificate. If you finish this course, it will help you learn in any of the following programs:

- Introduction to the Specialization in Applied Cryptography
- Specialization in Applied Cryptography

**Course Apply Link – Symmetric Cryptography **

**Symmetric Cryptography Quiz Answers**

### Week 1 Quiz Answers

#### Quiz 1: Caesar Cipher Quiz Answers

Q1. You agreed to use a Caesar cipher with a key of k=5 with a friend. While sitting in a group, the friend hands you over a message that says â€śQNGWFWDâ€ť. Decrypt the message.

library

Q2. Suppose you actually forgot the key. How many decryption computations of the cipher text â€śQNGWFWDâ€ť do you need to perform to reach to the plaintext? (Consider the worst case.)

26

Q3. Your friend proposes an update in the key and suggests a new key, k=523. How many cyclic shifts do you need to perform using the new key? You want to minimize the number of cyclic shifts on the letters.

3

#### Quiz 2: Modulo Operation and Caesar Cipher Quiz Answers

Q1. Letâ€™s use a modified Caesar Cipher where c = (p+2x) mod 26, where c and p are the ciphertext and the plaintext, respectively, and x is the key. How many distinct keys, producing distinct encryption/decryption transformations, are there now?

13

Q2. For c = (p+2x) mod 26, where c, p, and x are the ciphertext, the plaintext, and the key, respectively, what is the corresponding decryption? Select all that works.

- p = (c-x) mod 26
- p = (c-x) mod 13
**p = (c+26-2x) mod 26**- p = (c-2x) mod 13
**p = (c-2x) mod 26**

What is Freelancing? Is Freelancing Better in 2022?

Q3. Letâ€™s now use a modified Caesar Cipher where c = (p+3x) mod 26, where c and p are the ciphertext and the plaintext, respectively, and x is the key. How many distinct keys, producing distinct encryption/decryption transformations, are there now?

26

#### Quiz 3: Vigenere Cipher Quiz Answers

Q1. Letâ€™s use Vigenere Cipher to encrypt English text, ignoring capitalization and other symbols beyond English alphabets. The key is of length 1 and of value â€śYâ€ť or 24, i.e., the key is â€śYâ€ť. Which of the following statements is false?

- The cipher can be expressed as c = (p+24) mod 26, where c is each ciphertext letter and p is each plaintext letter.
- The cipher can be expressed as c = (p-2) mod 26, where c is each ciphertext letter and p is each plaintext letter.
- The cipher is equivalent to a Caesar Cipher.
- The cipher is equivalent to the Vigenere cipher using a key of length 3 and of value â€śYYYâ€ť.
**This cipher transforms a plaintext alphabet to distinct ciphertext alphabets with long enough plaintext inputs.**

Q2. Vigenere cipher is used with a key â€śXOâ€ť. What is the ciphertext corresponding to the plaintext, DRAGON?

AFXULB

Q3. Vigenere cipher is used with a key â€śXOâ€ť to encrypt a long English book, comprised of English alphabet letters and ignoring capitalization and other symbols. The key length is fixed, i.e., the key is 2 alphabets long. What is the number of possible distinct keys?

676

Q4. Vigenere cipher is used with a key â€śXOâ€ť to encrypt a long English book. You order the letters appearing in the encrypted book in the decreasing order of frequency (i.e., from the most frequently appearing to the least frequently appearing), and the result is: RGZNFIBJWPESCXHTMYAUOLDKVQ. Which ciphertext letters correspond to the plaintext letter E (which is the most frequent letter in the plaintext)? Apply all those that apply.

- A
**G**- Y
**R**- E
- T
- Z

### Week 2 Quiz Answers

*Check out these Articles:*

10 Killer Google Chrome Tips & Tricks that Everyone Must Know

Update Google Chrome on Windows 10 Successfully

#### Quiz 1: Rail Fence Cipher and Permutation Cipher

Q1. The Rail Fence cipher uses 4 rows/rails (the example in the lecture used 3). What is the ciphertext (the outcome of the rail fence cipher) for MEETMELATER?

MLEEAEMTRTE

Q2. A Permutation Cipher has a key length of 5, e.g., one key can be [3 2 1 4 5]. How many possible keys are there?

120

Q3. The plaintext MEETMELATER gets processed by a Permutation Cipher (with a key of [2 3 5 4 1] and no padding with extra letters. What is the corresponding ciphertext?

MEMERELTTEA

Q4. The plaintext MEETMELATER gets processed by a Permutation Cipher (with a key of [2 3 5 4 1] and with padding using the letter â€śzâ€ť (Alice and Bob agree to use the letter z for padding). What is the corresponding ciphertext?

MEZMERELZTTZEAZ

#### Quiz 2: Product Cipher Quiz Answers

Q1. The plaintext MEETMELATER gets processed by a product cipher, comprised of Caesar Cipher (with a key of 23) and Permutation Cipher (with a key of [5 3 1 4 2] and no padding with extra letters). What is the corresponding ciphertext?

BXJBBIQQJB0

Q2. The same product cipher in the previous question, comprised of Caesar Cipher and Permutation Cipher (with a key of length 5), is again used but with different keys. Given a plaintext, how many distinct ciphertexts can there be?

3120

Q3. The same product cipher in the previous question, comprised of Caesar Cipher and Permutation Cipher (with a key of length 5), is used to encrypt a long English book (ignoring capitalization and other symbols beyond English letters). Your friend makes the following claims. Select all those that are correct.

- â€śThe letter-pair/digram AX appeared the most in the ciphertext, so they must be TH. In other words, A is mapped from the letter T, and X is mapped from H.â€ť
**â€śLetter Z appeared the most in the ciphertext, so it must be mapped from the latter E.****â€śThe ordering between the Caesar and the Permutation does not matter within the product cipher, so we can decrypt it in any order.â€ť****â€śIf we replace the Caesar Cipher with a Monoalphabetic Cipher, then it becomes harder to crack by an attacker (who does not know the key).â€ť**- â€śIf we another Caesar Cipher encryption in the product cipher (so that there are two Caesar Cipher operations and a Permutation Cipher operation), then it becomes harder to crack by an attacker (who does not know the key).

### Week 3 Quiz Answers

#### Quiz 1: Ideal Block Cipher Quiz Answers

Q1. You are given a stream cipher and a block cipher with a block size of 64 bits. The data input is 32 bits. How many bits do you need to pad before processing the data input using a stream cipher?

0

Q2. The block cipher supports input/output of 64 bits. Which of the following is true about the key storage requirement?

**You need hundred million to one billion 1TB-hard-drives to store the key, where TB stands for Terabytes.**- You need more than one billion 1TB-hard-drives to store the key, where TB stands for Terabytes.
- You need ten to hundred million 1TB-hard-drives to store the key, where TB stands for Terabytes.
- You need less than ten million 1TB-hard-drives to store the key, where TB stands for Terabytes.

Q3. A block cipher takes a 3-bit plaintext and outputs a 3-bit ciphertext. If the cipher is an ideal block cipher, how many reversible transformations (keys) can it have?

40320

#### Quiz 2: DES Quiz Answers

Q1. True or False: DES is an ideal block cipher.

- True
**False**

Q2. True or False: DES displaying Avalanche Effect is a limitation because it describes that an error occurring in one of the rounds propagate through the rest of the rounds.

- True
**False**

Q3. An attacker is equipped with a computer that performs 10 trillion (10^13) DES decryptions per second, what is the average time required, in hours, for a brute force attacker to break DES?

1

Q4. Which of the followings are true about Feistel Cipher? Select all that applies.

**Feistel Cipher requires smaller key than ideal block cipher.**- The subkeys used in the Feistel Cipher rounds are independent to each other.
**Feistel Cipher is a product cipher.****Feistel Cipher processes the data in halves.**- Feistel Cipher competed with DES and got outdated after the wide use of DES.
- Feistel Cipher requires different encryption and decryption implementations in hardware and software.

### Week 4 Quiz Answers

#### Quiz 1: 3-DES and 4-DES Quiz Answers

Q1. Triple-DES or 3-DES encryption can be characterized by the following: C=Enc(K3,Dec(K2,Enc(K1,P))). Each keys, K1, K2, K3 are 56-bits-long and are independent to each other (the three-key version). The DES block size is 64 bits.

Using the big O notation, which of the following best describe the meet-in-the-middle attackerâ€™s storage requirement?

**O(2^56)**- O(2^112)
- O(168)
- O(2^168)

Q2. Triple-DES or 3-DES encryption can be characterized by the following: C=Enc(K3,Dec(K2,Enc(K1,P))). Each keys, K1, K2, K3 are 56-bits-long and are independent to each other (the three-key version). The DES block size is 64 bits.

Using the big O notation, which of the following best describe the meet-in-the-middle attackerâ€™s encryption/decryption computational effort?

- O(2^168)
- O(2^128)
- O(2^56)
- O(2^28)
**O(2^112)**

Q3. Triple-DES or 3-DES encryption can be characterized by the following: C=Enc(K3,Dec(K2,Enc(K1,P))). Each keys, K1, K2, K3 are 56-bits-long and are independent to each other (the three-key version). The DES block size is 64 bits.

The attacker now does not have known plaintext-ciphertext pair that it can use for her cryptanalysis. Using the big O notation, which of the following best describe the attackerâ€™s encryption/decryption computational effort?

- O(2^56)
- O(2^112)
**O(2^168)**- O(2^128)

Q4. Quadruple-DES or 4-DES encryption can be characterized by the following: C=Enc(K4,Enc(K3,Enc(K2,Enc(K1,P)))). Each keys, K1, K2, K3, K4, are 56-bits-long and are independent to each other. The DES block size is 64 bits.

Using the big O notation, which of the following best describe the meet-in-the-middle attackerâ€™s storage requirement?

- O(64*2^56)
- O(2^224)
**O(2^112)**- O(2^128)
- O(2^56)

Q5. Quadruple-DES or 4-DES encryption can be characterized by the following: C=Enc(K4,Enc(K3,Enc(K2,Enc(K1,P)))). Each keys, K1, K2, K3, K4, are 56-bits-long and are independent to each other. The DES block size is 64 bits.

Using the big O notation, which of the following best describe the meet-in-the-middle attackerâ€™s encryption/decryption computational effort?

- O(2^224)
- O(2^128)
- O(2^58)
**O(2^112)**- O(2^56)

Q6. Quadruple-DES or 4-DES encryption can be characterized by the following: C=Enc(K4,Enc(K3,Enc(K2,Enc(K1,P)))). Each keys, K1, K2, K3, K4, are 56-bits-long and are independent to each other. The DES block size is 64 bits.

The attacker now does not have known plaintext-ciphertext pair that it can use for her cryptanalysis. Using the big O notation, which of the following best describe the attackerâ€™s encryption/decryption computational effort?

**O(2^224)**- O(2^56)
- O(2^58)
- O(2^128)
- O(2^112)

#### Quiz 2: AES Quiz Answers

Q1. What is the block size for AES in Bytes?

16

Q2. Which of the following key lengths does AES support? Select all that applies.

**256 bits**- 64 bits
**128 bits**- 56 bits
- 228 bits
**192 bits**

Q3. Which of the followings correspond to transposition only (no substitution)?

- MixColumns
- SubBytes
- AddRoundKey
**ShiftRows**

Q4. Which of the followings use the key?

**AddRoundKey**- MixColumns
- ShiftRows
- SubBytes

Q5. Which of the followings are true about AES? Select all that applies.

**The number of rounds depends on the key length.****AES involves both substitution and transposition.**- The same algorithms for encryption (SubBytes, MixColumns) are also used for decryption.
- AES is based on Feistel Cipher.
- AES algorithm is only known to NIST, which standardized AES.

### Week 5 Quiz Answers

#### Quiz 1: Block Cipher Operation Modes

Q1. Which of the following describes the 2nd block encryption output of CBC mode (C2). The followings are given: E (an encryption cipher function), K (the key). C1 (the cipher output from the 1st block encryption), P2 (the plaintext for the 2nd block), and XOR (and exclusive-or function). For example, XOR(x,y) indicate the bit-by-bit XOR between the two bit vectors x and y, and E(K,P2) is the encryption output when using the key K and the plaintext P2.

- C2 = XOR(P2,E(K,XOR(C1,P1)))
- C2 = XOR(P1,E(K,XOR(C1,P1)))
- C2 = E(K,XOR(C1,P1))
- C2 = XOR(E(C1),K)
- C2 = XOR(P2,E(K,XOR(C1,P2)))
**C2 = E(K,XOR(C1,P2))**

Q2. Which of the following operation modes do not require padding (if the data does not fill the block)? Check all that applies.

**OFB**- CBC
**CTR**- ECB
**CFB**

Q3. Which of the followings describe the 2nd block encryption output (C2) of OFB mode? The followings are given: E (an encryption cipher function), K (the key). C1 (the cipher output from the 1st block encryption), P2 (the plaintext for the 2nd block), P1 (the plaintext for the 1st block), and XOR (and exclusive-or function). For example, XOR(x,y) indicate the bit-by-bit XOR between the two bit vectors x and y, and E(K,P1) is the encryption output when using the key K and the plaintext P1.

**C2 = XOR(P2,E(K,XOR(C1,P1)))**- C2 = XOR(P2,E(K,XOR(C1,P2)))
- C2 = E(K,XOR(C1,P2))
- C2 = XOR(E(C1),K)
- C2 = XOR(P1,E(K,XOR(C1,P1)))
- C2 = E(K,XOR(C1,P1))

Q4. Suppose a small, low-power device experiences that a real-time computation of the encryption/decryption function is burdensome (e.g., serving as the bottleneck of the performance) and wants to compute the encryption/decryption functions offline (e.g., computed before the plaintext/ciphertext). Which of the following block cipher operation modes support such feature? Check all that applies.

- CBC
**OFB****CTR**- CFB

Q5. You are given a block cipher with a block size of 64 bits. Given a data input of 32 bits, how many bits do you need to pad if the using the ECB operation mode?

32

Q6. You are given a block cipher with a block size of 64 bits. Given a data input of 32 bits, how many bits do you need to pad if the using the CFB operation mode?

0

Q7. Alice and Bob is not synchronized in time, and their clock frequency is different. Which of the block cipher operation modes would be affected by such lack of synchronization? Check all that applies.

**CTR**- OFB
- CBC
- CFB
- ECB

Q8. Suppose Pi indicates the plaintext input for the block cipher i from the senderâ€™s perspective, e.g., P2 is the plaintext input for the 2nd block cipher, and Ci is the ciphertext input for the block cipher i from the receiverâ€™s perspective. (If there were no errors, Ci is also the ciphertext output of the block cipher i from the sender.) Which of the following scenarios causing errors affect C3 (and cause error in C3)? Select all that applies.

- Error occurs on C2 for CTR Mode.
- Error occurs on C1 for CBC Mode.
- Error occurs on C2 for OFB Mode.
**Error occurs on P2 for CFB Mode.**- Error occurs on C2 for ECB Mode.
**Error occurs on P1 for CBC Mode.**- Error occurs on C2 for CFB Mode.

**Conclusion**

Hopefully, this article will be useful for you to find all theÂ **Week, final assessment, and Peer Graded Assessment Answers of the Symmetric Cryptography Quiz of Coursera**Â and grab some premium knowledge with less effort. If this article really helped you in any way then make sure to share it with your friends on social media and let them also know about this amazing training. You can also check out our other courseÂ Answers.Â So, be with us guys we will share a lot more free courses and their exam/quiz solutions also, and follow ourÂ Techno-RJÂ **Blog**Â for more updates.

I have recently started a website, the information you offer on this website has helped me tremendously. Thanks for all of your time & work.

I carry on listening to the reports speak about receiving free online grant applications so I have been looking around for the most excellent site to get one. Could you advise me please, where could i get some?

F*ckinâ€™ awesome things here. Iâ€™m very glad to see your post. Thanks a lot and i am looking forward to contact you. Will you please drop me a mail?

As soon as I discovered this website I went on reddit to share some of the love with them.

Thank you, I’ve recently been looking for information about this subject for ages and yours is the greatest I have discovered so far. But, what about the bottom line? Are you sure about the source?

Nice read, I just passed this onto a friend who was doing some research on that. And he actually bought me lunch as I found it for him smile Thus let me rephrase that: Thank you for lunch! “To be 70 years young is sometimes far more cheerful and hopeful than to be 40 years old.” by Oliver Wendell Holmes.

Its such as you learn my thoughts! You seem to understand a lot about this, such as you wrote the e-book in it or something. I feel that you just could do with some percent to power the message home a little bit, however other than that, that is great blog. A great read. I will definitely be back.

Having read this I thought it was very informative. I appreciate you taking the time and effort to put this article together. I once again find myself spending way to much time both reading and commenting. But so what, it was still worth it!

Simply want to say your article is as astonishing.

The clearness in your post is simply excellent and i could assume you are an expert on this subject.

Well with your permission allow me to grab your RSS feed

to keep up to date with forthcoming post.

Thanks a million and please continue the gratifying work.

Enjoyed reading through this, very good stuff, thanks.

Thanks a bunch for sharing this with all of us you actually know what you’re talking about! Bookmarked. Please also visit my website =). We could have a link exchange agreement between us!