Related Questions
What is the correct answer?
4
Digital Signatures authenticates the sender by appending the original message with the ____ digest.
D. None of the mentioned above
What is the correct answer?
4
Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:
What is the correct answer?
4
Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value?
D. Data retrieval in its original form
What is the correct answer?
4
Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?
A. It requires large block size
B. Padding is done to make the plain text divisible into blocks of fixed size
C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
What is the correct answer?
4
Which one of the following algorithms is not used in asymmetric-key cryptography?
B. Electronic code book algorithm
C. Diffie-Hellman algorithm
What is the correct answer?
4
RSA algorithm is ____ cryptography algorithm.
D. None of the mentioned above
What is the correct answer?
4
A mechanism used to encrypt and decrypt data.
What is the correct answer?
4
Codes and ciphers are different ways to _____ a message.
D. All of the mentioned above
What is the correct answer?
4
How many elements are used in cryptography tools?
What is the correct answer?
4
Cipher block chaining or CBC is an advancement made on _____.
D. All of the mentioned above
What is the correct answer?
4
Conventional cryptography also known as ... encryption.
What is the correct answer?
4
How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?
D. Only one key and no subkeys
What is the correct answer?
4
The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?
A. The input text is divided into two parts: one being left half and another one being right half.
B. Swapping of the left and right halves are performed after each round.
C. The plain text is converted into a matrix form first
What is the correct answer?
4
Which of the following are used to create a message digest by the network security protocols?
What is the correct answer?
4
In Cipher block chaining mode, the current plaintext block is added to the ____.
A. Previous ciphertext block
C. Middle ciphertext block
D. None of the mentioned above
What is the correct answer?
4
When a hash function is used to provide message authentication, the hash function value is called to as:
What is the correct answer?
4
Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?
What is the correct answer?
4
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?
What is the correct answer?
4
The greatest threat is to public cryptography or asymmetric algorithms used for ____.
A. Digital signatures and
D. None of the mentioned above
What is the correct answer?
4
The above steps are performed in each round of which of the following ciphers?
B. Data Encryption Standard (DES)
C. Advance Encryption Standard (AES)
What is the correct answer?
4
A cryptographic hash function is an equation used to verify the ____ of data.
D. None of the mentioned above
What is the correct answer?
4
When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?
D. xor of subkey with function f
What is the correct answer?
4
Security Goals of Cryptography are
What is the correct answer?
4
Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
What is the correct answer?
4
Which of the following is not a type of symmetric-key cryptography technique?
B. Data Encryption Standard (DES)
What is the correct answer?
4
What is the output of the N 1024-bit blocks from the Nth stage in this?
What is the correct answer?
4
Which of the following ciphers uses asymmetric key cryptography?
B. Data Encryption Standard (DES)
What is the correct answer?
4
_____ and encryption is two separate cryptographic processes.
D. None of the mentioned above
What is the correct answer?
4
The private key in asymmetric key cryptography is kept by
D. All the connected devices to the network
What is the correct answer?
4
Which of the following cannot be chosen as a key in the Caesar cipher?
B. An alphabet (A-Z or a-z)