Related Questions
What is the correct answer?
4
Hash functions are mathematical functions that transform or map a given set of data into a bit string of fixed size, also known as the hash value.
D. None of the mentioned above
What is the correct answer?
4
Which two principles of quantum mechanics on which quantum cryptography are dependent?
A. Heisenberg Uncertainty Principle and Photon Polarization Principle.
B. Fundamental Principle and Bohr's Model Principle
C. Momentum Principle and Photons Principle
D. Planck's Principle and Fundamental Principle
What is the correct answer?
4
The Hash Function takes an input of arbitrary length and converts it into a fixed length output.Which of the following names can we use for denoting the output of the hash function?
What is the correct answer?
4
Codes and ciphers are different ways to _____ a message.
D. All of the mentioned above
What is the correct answer?
4
Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
What is the correct answer?
4
With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.
D. None of the mentioned above
What is the correct answer?
4
Which of the following modes of operation in DES is used for operating?
A. Cipher Feedback Mode (CFB)
B. Cipher Block chaining (CBC)
C. Electronic code book (ECB)
D. Output Feedback Modes (OFB)
What is the correct answer?
4
Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____.
D. None of the mentioned above
What is the correct answer?
4
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?
What is the correct answer?
4
Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?
A. CBC (Cipher Block Chaining)
B. ECB (Electronic Code Book)
C. CFB (Cipher text Feed Back)
What is the correct answer?
4
The above steps are performed in each round of which of the following ciphers?
B. Data Encryption Standard (DES)
C. Advance Encryption Standard (AES)
What is the correct answer?
4
Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?
A. CBC is a mode of operation for stream ciphers.
B. Initialization vector (IV) is used in CBC in the initial phase.
C. It has better resistive nature towards cryptanalysis than ECB
What is the correct answer?
4
Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?
C. Cryptographic Solution
What is the correct answer?
4
____ is the message or data that can be readable by the sender.
D. All of the mentioned above
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol
What is the correct answer?
4
What is the full-form of RSA in the RSA encryption technique?
A. Round Security Algorithm
B. Rivest, Shamir, Adleman
What is the correct answer?
4
ElGamal encryption system is an asymmetric key encryption algorithm.
A. Public-key cryptography
B. Private-key cryptography
What is the correct answer?
4
Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.
D. All of the mentioned above
What is the correct answer?
4
To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
A. Word, number, or phrase
What is the correct answer?
4
Which of the following ciphers is a block cipher?
What is the correct answer?
4
Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?
B. Modification of message
What is the correct answer?
4
An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.
A. Randomize the decryption
B. Randomize the encryption
C. Minimize and maximize the randomization
D. None of the mentioned above
What is the correct answer?
4
Among the following given options, chose the strongest encryption technique?
A. DES ( Data Encryption Standard)
D. AES (Advance Encryption Standard)
What is the correct answer?
4
Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value?
D. Data retrieval in its original form
What is the correct answer?
4
_____ and encryption is two separate cryptographic processes.
D. None of the mentioned above
What is the correct answer?
4
RSA algorithm is ____ cryptography algorithm.
D. None of the mentioned above
What is the correct answer?
4
The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?
A. The input text is divided into two parts: one being left half and another one being right half.
B. Swapping of the left and right halves are performed after each round.
C. The plain text is converted into a matrix form first
What is the correct answer?
4
The private key in asymmetric key cryptography is kept by
D. All the connected devices to the network
What is the correct answer?
4
Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.
D. All of the mentioned above
What is the correct answer?
4
Which of the following cannot be chosen as a key in the Caesar cipher?
B. An alphabet (A-Z or a-z)