Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
D. All of the mentioned above
Reverse order
Next order
Both A and B
All of the mentioned above
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
For large block sizes
For fixed block sizes
For small block sizes
None of the above
128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
Cryptography
Algorithm
Data flow
None of these
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
Passcode or a password
Developed code
Network set
None of the mentioned above
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
Abstract view
Mathematical function
Both A and B
None of the mentioned above
Resource reservation protocol
SCTP
TLS
ECN
1024
512
256
1248
Different
Same
Both A and B
None of the mentioned above
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
512 bits
1024 bits
2048 bits
None of the above
Hash value
Map value
Both A and B
None of the mentioned above
RSA
SHA-1
DES
MD5
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
Each ciphertext block gets 'fed back' into the encryption process
Encrypt the next plaintext block
Both A and B
None of the mentioned above