Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
A. Electronic Code Book
Edited
Main Text
Plain text
All of the mentioned above
Systematic
Symmetric
Asymmetric
None of the mentioned above
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
Attackers
Sender
Receiver
None of the mentioned above
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
Sender
Receiver
Sender and receiver
All the connected devices to the network
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
Abstract view
Mathematical function
Both A and B
None of the mentioned above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
1024
512
256
1248
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
Output type
Input type
Process type
All of the mentioned above
System approach
Cyber safe
Cryptography
None of the mentioned above
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
Different
Same
Both A and B
None of the mentioned above
Encrypt
Decrypt
Both A and B
All of the mentioned above
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
16 bits
64 bits
32 bits
All of the mentioned above
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys