Encrypt
Decrypt
Both A and B
All of the mentioned above
C. Both A and B
Next block
Previous block
Middle block
All of the mentioned above
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
Fixed size
Variable
Integration
All of the mentioned above
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
Cryptography
Algorithm
Data flow
None of these
Hash value
Hash Code
Message Digest
All of the above
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
Xuejia Lai and James Massey
Xuejia Lai and Bruce Schneier
Xuejia Lai and Carlisle Adams
Xuejia Lai and Stafford Tavares
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
Masquerade
Modification of message
Denial of service
Traffic analysis
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
Authentication
Non repudiation
Data Integrity
All of the above
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
Variety
Validity
Veracity
None of the mentioned above
i.
iii.
All of the mentioned
None of the mentioned
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Avalanche effect
Completeness
Both a. and b.
None of the above
16 bits
64 bits
32 bits
All of the mentioned above
Quantum Solution
Foreseen Solution
Cryptographic Solution
Block Cipher Solution
For large block sizes
For fixed block sizes
For small block sizes
None of the above
Output type
Input type
Process type
All of the mentioned above