Related Questions
What is the correct answer?
4
The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?
A. The input text is divided into two parts: one being left half and another one being right half.
B. Swapping of the left and right halves are performed after each round.
C. The plain text is converted into a matrix form first
What is the correct answer?
4
Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:
What is the correct answer?
4
Hash functions are mathematical functions that transform or map a given set of data into a bit string of fixed size, also known as the hash value.
D. None of the mentioned above
What is the correct answer?
4
Codes and ciphers are different ways to _____ a message.
D. All of the mentioned above
What is the correct answer?
4
Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?
B. Modification of message
What is the correct answer?
4
Conventional cryptography also known as ... encryption.
What is the correct answer?
4
Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?
A. It requires large block size
B. Padding is done to make the plain text divisible into blocks of fixed size
C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
What is the correct answer?
4
In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.
A. 5 similar rounds having 2 pair ; every alternate
C. 8 ; the first and last
What is the correct answer?
4
A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?
C. An array of characters (i.e. a string)
What is the correct answer?
4
How many elements are used in cryptography tools?
What is the correct answer?
4
Which one of the following algorithms is not used in asymmetric-key cryptography?
B. Electronic code book algorithm
C. Diffie-Hellman algorithm
What is the correct answer?
4
For which of the following should EBC (Electronic Code Book) process not be used for encryption?
What is the correct answer?
4
In Cipher block chaining mode, the current plaintext block is added to the ____.
A. Previous ciphertext block
C. Middle ciphertext block
D. None of the mentioned above
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol
What is the correct answer?
4
Security Goals of Cryptography are
What is the correct answer?
4
Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?
What is the correct answer?
4
Which of the following is a mode of operation for the Block ciphers in cryptography?
A. Electronic Code Book (ECB)
B. Cipher Block Chaining (CBC)
What is the correct answer?
4
Hash functions are used in ___ and have variable levels of complexity and difficulty.
D. None of the mentioned above
What is the correct answer?
4
When a hash function is used to provide message authentication, the hash function value is called to as:
What is the correct answer?
4
Block ciphers accumulate symbols in a message of a ______.
D. All of the mentioned above
What is the correct answer?
4
What is the block size of plain text in SHA- 512 algorithm?
What is the correct answer?
4
Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?
C. Cryptographic Solution
What is the correct answer?
4
Which of the following modes of operation in DES is used for operating?
A. Cipher Feedback Mode (CFB)
B. Cipher Block chaining (CBC)
C. Electronic code book (ECB)
D. Output Feedback Modes (OFB)
What is the correct answer?
4
How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?
D. Only one key and no subkeys
What is the correct answer?
4
You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,
Is the given matrix 'A', a valid key to be used for encryption?
What is the correct answer?
4
Among the following given options, chose the strongest encryption technique?
A. DES ( Data Encryption Standard)
D. AES (Advance Encryption Standard)
What is the correct answer?
4
All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options
What is the correct answer?
4
Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.
D. All of the mentioned above
What is the correct answer?
4
What is the full-form of RSA in the RSA encryption technique?
A. Round Security Algorithm
B. Rivest, Shamir, Adleman
What is the correct answer?
4
____ is the message or data that can be readable by the sender.
D. All of the mentioned above