Home
Current Affairs January 2024

What is the correct answer?

4

A mechanism used to encrypt and decrypt data.

A. Cryptography

B. Algorithm

C. Data flow

D. None of these

Correct Answer :

A. Cryptography


Cryptography is a mechanism used to encrypt and decrypt data.

Related Questions

What is the correct answer?

4

The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?

A. 128 key size: 10 rounds

B. 192 key size: 12 rounds

C. 256 key size: 14 rounds

D. All of the above

What is the correct answer?

4

Encryption algorithms are divided into two categories based on the ______.

A. Output type

B. Input type

C. Process type

D. All of the mentioned above

What is the correct answer?

4

Which of the following is a mode of operation for the Block ciphers in cryptography?

A. Electronic Code Book (ECB)

B. Cipher Block Chaining (CBC)

C. Counter (CTR) mode

D. All of the above

What is the correct answer?

4

You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,
Is the given matrix 'A', a valid key to be used for encryption?

A. Yes

B. No

C. Can't be determined

D. Data insufficient

What is the correct answer?

4

Which two principles of quantum mechanics on which quantum cryptography are dependent?

A. Heisenberg Uncertainty Principle and Photon Polarization Principle.

B. Fundamental Principle and Bohr's Model Principle

C. Momentum Principle and Photons Principle

D. Planck's Principle and Fundamental Principle

What is the correct answer?

4

The process of decryption of an AES ciphertext is similar to the encryption process in the ______.

A. Reverse order

B. Next order

C. Both A and B

D. All of the mentioned above

What is the correct answer?

4

Amongst which of the following is / are true with reference to the rounds in AES

A. Byte Substitution

B. Shift Row

C. Mix Column and Key Addition

D. All of the mentioned above

What is the correct answer?

4

Codes and ciphers are different ways to _____ a message.

A. Encrypt

B. Decrypt

C. Both A and B

D. All of the mentioned above

What is the correct answer?

4

To encrypt the plaintext, a cryptographic algorithm works in combination with a key...

A. Word, number, or phrase

B. Special Symbols

C. Function Keys

D. All of these

What is the correct answer?

4

Which of the following is not a type of symmetric-key cryptography technique?

A. Caesar cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman cipher

D. Playfair cipher

What is the correct answer?

4

In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.

A. Passcode or a password

B. Developed code

C. Network set

D. None of the mentioned above

What is the correct answer?

4

How many elements are used in cryptography tools?

A. 1

B. 4

C. 6

D. 3

What is the correct answer?

4

Hash functions are mathematical functions that transform or map a given set of data into a bit string of fixed size, also known as the hash value.

A. Hash value

B. Map value

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?

A. f function

B. permutation p

C. swapping of halves

D. xor of subkey with function f

What is the correct answer?

4

Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.

A. 1024

B. 512

C. 256

D. 1248

What is the correct answer?

4

International Data Encryption Algorithm (IDEA) was developed by

A. Xuejia Lai and James Massey

B. Xuejia Lai and Bruce Schneier

C. Xuejia Lai and Carlisle Adams

D. Xuejia Lai and Stafford Tavares

What is the correct answer?

4

Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?

A. CBC is a mode of operation for stream ciphers.

B. Initialization vector (IV) is used in CBC in the initial phase.

C. It has better resistive nature towards cryptanalysis than ECB

D. None of the above

What is the correct answer?

4

Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?

A. It requires large block size

B. Padding is done to make the plain text divisible into blocks of fixed size

C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.

D. None of the above

What is the correct answer?

4

Which of the following ciphers is a block cipher?

A. Caesar cipher

B. Vernam cipher

C. Playfair cipher

D. None of the above

What is the correct answer?

4

How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?

A. 64 sub- keys

B. 48 sub- keys

C. 52 sub- keys

D. Only one key and no subkeys

What is the correct answer?

4

The greatest threat is to public cryptography or asymmetric algorithms used for ____.

A. Digital signatures and

B. Key exchange

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

A cryptographic hash function is an equation used to verify the ____ of data.

A. Variety

B. Validity

C. Veracity

D. None of the mentioned above

What is the correct answer?

4

____ is the message or data that can be readable by the sender.

A. Edited

B. Main Text

C. Plain text

D. All of the mentioned above

What is the correct answer?

4

Hash functions are used in ___ and have variable levels of complexity and difficulty.

A. System approach

B. Cyber safe

C. Cryptography

D. None of the mentioned above

What is the correct answer?

4

The private key in asymmetric key cryptography is kept by

A. Sender

B. Receiver

C. Sender and receiver

D. All the connected devices to the network

What is the correct answer?

4

Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value?

A. Password Check

B. Data Integrity check

C. Digital Signatures

D. Data retrieval in its original form

What is the correct answer?

4

Which one of the following algorithms is not used in asymmetric-key cryptography?

A. DSA algorithm

B. Electronic code book algorithm

C. Diffie-Hellman algorithm

D. RSA algorithm

What is the correct answer?

4

Which of the following modes of operation in DES is used for operating?

A. Cipher Feedback Mode (CFB)

B. Cipher Block chaining (CBC)

C. Electronic code book (ECB)

D. Output Feedback Modes (OFB)

What is the correct answer?

4

For which of the following should EBC (Electronic Code Book) process not be used for encryption?

A. For large block sizes

B. For fixed block sizes

C. For small block sizes

D. None of the above

What is the correct answer?

4

An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.

A. Randomize the decryption

B. Randomize the encryption

C. Minimize and maximize the randomization

D. None of the mentioned above