Related Questions
What is the correct answer?
4
Which of the following is not a type of symmetric-key cryptography technique?
B. Data Encryption Standard (DES)
What is the correct answer?
4
ElGamal encryption system is an asymmetric key encryption algorithm.
A. Public-key cryptography
B. Private-key cryptography
What is the correct answer?
4
Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?
A. CBC (Cipher Block Chaining)
B. ECB (Electronic Code Book)
C. CFB (Cipher text Feed Back)
What is the correct answer?
4
____ is the message or data that can be readable by the sender.
D. All of the mentioned above
What is the correct answer?
4
You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,
Is the given matrix 'A', a valid key to be used for encryption?
What is the correct answer?
4
Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
What is the correct answer?
4
_____ ciphers encrypt uniformly sized blocks of data.
D. All of the mentioned above
What is the correct answer?
4
A cryptographic hash function is an equation used to verify the ____ of data.
D. None of the mentioned above
What is the correct answer?
4
An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.
A. Randomize the decryption
B. Randomize the encryption
C. Minimize and maximize the randomization
D. None of the mentioned above
What is the correct answer?
4
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?
What is the correct answer?
4
Block ciphers accumulate symbols in a message of a ______.
D. All of the mentioned above
What is the correct answer?
4
When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?
D. xor of subkey with function f
What is the correct answer?
4
The Data Encryption Standard (DES) is an example of a ...
A. Conventional cryptosystem
B. Asymmetric cryptosystem
What is the correct answer?
4
Which possible Attacks in Quantum Cryptography can take place?
A. Possible Attacks in Quantum Cryptography and Birthday Attack
B. Birthday attack and Boomerang attack
C. Brute force attack and Faked-State-Attack
D. Possible Attacks in Quantum Cryptography and Faked-State Attack
What is the correct answer?
4
Security Goals of Cryptography are
What is the correct answer?
4
In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.
A. Passcode or a password
D. None of the mentioned above
What is the correct answer?
4
Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:
What is the correct answer?
4
Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?
What is the correct answer?
4
Which of the following are used to create a message digest by the network security protocols?
What is the correct answer?
4
All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options
What is the correct answer?
4
What is the output of the N 1024-bit blocks from the Nth stage in this?
What is the correct answer?
4
Which of the following is not a principle of data security?
What is the correct answer?
4
With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.
D. None of the mentioned above
What is the correct answer?
4
To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
A. Word, number, or phrase
What is the correct answer?
4
What is the block size of plain text in SHA- 512 algorithm?
What is the correct answer?
4
A hash function is a _____ that converts a numerical input value into another compressed numerical value.
D. None of the mentioned above
What is the correct answer?
4
Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.
D. None of the mentioned above
What is the correct answer?
4
Which of the following is not a property of Hash Function?
What is the correct answer?
4
The greatest threat is to public cryptography or asymmetric algorithms used for ____.
A. Digital signatures and
D. None of the mentioned above
What is the correct answer?
4
International Data Encryption Algorithm (IDEA) was developed by
A. Xuejia Lai and James Massey
B. Xuejia Lai and Bruce Schneier
C. Xuejia Lai and Carlisle Adams
D. Xuejia Lai and Stafford Tavares