Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
B. Algorithm for performing encryption and decryption
Hash value
Map value
Both A and B
None of the mentioned above
Each ciphertext block gets 'fed back' into the encryption process
Encrypt the next plaintext block
Both A and B
None of the mentioned above
Authentication
Non repudiation
Data Integrity
All of the above
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
Sender
Receiver
Sender and receiver
All the connected devices to the network
Cryptography
Algorithm
Data flow
None of these
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Systematic
Symmetric
Asymmetric
None of the mentioned above
Hashing
Decryption
Processing
None of the mentioned above
Quantum Solution
Foreseen Solution
Cryptographic Solution
Block Cipher Solution
512 bits
1024 bits
N x 1024bits
N x 512 bits
42
93
114
103
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Output type
Input type
Process type
All of the mentioned above
Hill Cipher
Playfair cipher
Both a and b
None of the above
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
1024
512
256
1248
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Reverse order
Next order
Both A and B
All of the mentioned above
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
RSA
SHA-1
DES
MD5
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above