Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
B. Encrypted message
Attackers
Sender
Receiver
None of the mentioned above
Confidentiality
Authenticityn
Data integrityn
All of these
Fixed size
Variable
Integration
All of the mentioned above
Masquerade
Modification of message
Denial of service
Traffic analysis
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
512 bits
1024 bits
N x 1024bits
N x 512 bits
Systematic
Symmetric
Asymmetric
None of the mentioned above
UWP
NUS
WUP
QSL
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Output type
Input type
Process type
All of the mentioned above
Yes
No
Can't be determined
Data insufficient
f function
permutation p
swapping of halves
xor of subkey with function f
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
Unsecured data
Secured data
Insecure
None of the mentioned above
Resource reservation protocol
SCTP
TLS
ECN
Sender
Receiver
Sender and receiver
All the connected devices to the network
16 bits
64 bits
32 bits
All of the mentioned above