Question No : 22
The private key in asymmetric key cryptography is kept by
Question No : 23
Which one of the following algorithms is not used in asymmetric-key cryptography?
Question No : 24
Which is the cryptographic protocol that is used to protect an HTTP connection?
Question No : 25
ElGamal encryption system is an asymmetric key encryption algorithm.
Question No : 26
We are provided the plain text SUN. You need to convert the given plain text into ciphertext under the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the given text if the key is 2?
Question No : 27
Which of the following cannot be chosen as a key in the Caesar cipher?
Question No : 28
Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?
Wanna test your skill? Here are some exams we prepared for you. So if you need to test your skill just attempt any exam from bellow.
Exam Name | No. Of Q | Link |
Computer set 1 | 30 | Start |
Computer set 2 | 30 | Start |
Computer set 3 | 30 | Start |
Computer set 4 | 30 | Start |
Computer set 5 | 30 | Start |
Computer set 6 | 30 | Start |
Computer set 7 | 30 | Start |
Computer set 8 | 30 | Start |
Computer set 9 | 30 | Start |
Computer set 10 | 30 | Start |
Computer set 11 | 30 | Start |
Computer set 12 | 30 | Start |