asymmetric-key
logical-key
symmetric-key
None of these
C. symmetric-key
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
Masquerade
Modification of message
Denial of service
Traffic analysis
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
i.
iii.
All of the mentioned
None of the mentioned
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
asymmetric-key
logical-key
symmetric-key
None of these
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
f function
permutation p
swapping of halves
xor of subkey with function f
Unsecured data
Secured data
Insecure
None of the mentioned above
Set
Block
Rack
All of the mentioned above
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
Hill Cipher
Playfair cipher
Both a and b
None of the above
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Edited
Main Text
Plain text
All of the mentioned above
Variety
Validity
Veracity
None of the mentioned above
Message Field
Message Digest
Message Score
Message Leap
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
Reverse order
Next order
Both A and B
All of the mentioned above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
System approach
Cyber safe
Cryptography
None of the mentioned above
Authentication
Non repudiation
Data Integrity
All of the above
Data Confidentiality
Data Integrity
Authentication
None of the above
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
512 bits
1024 bits
N x 1024bits
N x 512 bits
Attackers
Sender
Receiver
None of the mentioned above
Hash value
Map value
Both A and B
None of the mentioned above
Avalanche effect
Completeness
Both a. and b.
None of the above