DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
D. AES (Advance Encryption Standard)
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
Confidentiality
Authenticityn
Data integrityn
All of these
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
Passcode or a password
Developed code
Network set
None of the mentioned above
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
For large block sizes
For fixed block sizes
For small block sizes
None of the above
Hill Cipher
Playfair cipher
Both a and b
None of the above
Public-key cryptography
Private-key cryptography
Both
None of these
Systematic
Symmetric
Asymmetric
None of the mentioned above
RSA
SHA-1
DES
MD5
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Reverse order
Next order
Both A and B
All of the mentioned above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
Hashing
Decryption
Processing
None of the mentioned above
Output type
Input type
Process type
All of the mentioned above
Sender
Receiver
Sender and receiver
All the connected devices to the network
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
asymmetric-key
logical-key
symmetric-key
None of these
Quantum Solution
Foreseen Solution
Cryptographic Solution
Block Cipher Solution
Each ciphertext block gets 'fed back' into the encryption process
Encrypt the next plaintext block
Both A and B
None of the mentioned above
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Fixed size
Variable
Integration
All of the mentioned above
Abstract view
Mathematical function
Both A and B
None of the mentioned above
1
4
6
3
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above