Set
Block
Rack
All of the mentioned above
B. Block
Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
Sender
Receiver
Sender and receiver
All the connected devices to the network
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
Output type
Input type
Process type
All of the mentioned above
Set
Block
Rack
All of the mentioned above
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
Systematic
Symmetric
Asymmetric
None of the mentioned above
Passcode or a password
Developed code
Network set
None of the mentioned above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
1024
512
256
1248
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
1
4
6
3
Cryptography
Algorithm
Data flow
None of these
42
93
114
103
512 bits
1024 bits
2048 bits
None of the above
Hill Cipher
Playfair cipher
Both a and b
None of the above
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Authentication
Non repudiation
Data Integrity
All of the above
Different
Same
Both A and B
None of the mentioned above
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above