Hashing
Decryption
Processing
None of the mentioned above
A. Hashing
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
512 bits
1024 bits
2048 bits
None of the above
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Passcode or a password
Developed code
Network set
None of the mentioned above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
Hash value
Hash Code
Message Digest
All of the above
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
1024
512
256
1248
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
16 bits
64 bits
32 bits
All of the mentioned above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Xuejia Lai and James Massey
Xuejia Lai and Bruce Schneier
Xuejia Lai and Carlisle Adams
Xuejia Lai and Stafford Tavares
42
93
114
103
For large block sizes
For fixed block sizes
For small block sizes
None of the above
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Hashing
Decryption
Processing
None of the mentioned above
Edited
Main Text
Plain text
All of the mentioned above
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Next block
Previous block
Middle block
All of the mentioned above
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
Encrypt
Decrypt
Both A and B
All of the mentioned above
Fixed size
Variable
Integration
All of the mentioned above
f function
permutation p
swapping of halves
xor of subkey with function f