16 bits
64 bits
32 bits
All of the mentioned above
B. 64 bits
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
UWP
NUS
WUP
QSL
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
Next block
Previous block
Middle block
All of the mentioned above
16 bits
64 bits
32 bits
All of the mentioned above
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
Set
Block
Rack
All of the mentioned above
Unsecured data
Secured data
Insecure
None of the mentioned above
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
Fixed size
Variable
Integration
All of the mentioned above
Hash value
Map value
Both A and B
None of the mentioned above
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
Authentication
Non repudiation
Data Integrity
All of the above
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above
512 bits
1024 bits
2048 bits
None of the above
System approach
Cyber safe
Cryptography
None of the mentioned above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
Passcode or a password
Developed code
Network set
None of the mentioned above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
Cryptography
Algorithm
Data flow
None of these
Word, number, or phrase
Special Symbols
Function Keys
All of these
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
An integer
An alphabet (A-Z or a-z)
A string
None of the above
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
Digital signatures and
Key exchange
Both A and B
None of the mentioned above