Home
Current Affairs January 2024

What is the correct answer?

4

Encryption algorithms are divided into two categories based on the ______.

A. Output type

B. Input type

C. Process type

D. All of the mentioned above

Correct Answer :

B. Input type


Encryption algorithms are classified into two categories based on the type of input they receive: block cyphers and stream cyphers. Block cyphers are the most used type of encryption technique. This type of encryption technique takes as input a defined size of data, such as b bits, and outputs as output another block of data of the same size as the input.

Related Questions

What is the correct answer?

4

Security Goals of Cryptography are

A. Confidentiality

B. Authenticityn

C. Data integrityn

D. All of these

What is the correct answer?

4

The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?

A. 128 key size: 10 rounds

B. 192 key size: 12 rounds

C. 256 key size: 14 rounds

D. All of the above

What is the correct answer?

4

What does IDEA stand for in the world of cryptography?orThe IDEA word in the IDEA algorithm is the abbreviation for which of the following?

A. Independent Decryption Environment Analysis

B. International Defense Encryption Area

C. International Data Encryption Algorithm

D. None of the above

What is the correct answer?

4

A hash function is a _____ that converts a numerical input value into another compressed numerical value.

A. Abstract view

B. Mathematical function

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____.

A. Cryptographic system

B. Cryptographic tasks

C. Decryption system

D. None of the mentioned above

What is the correct answer?

4

_____ and encryption is two separate cryptographic processes.

A. Hashing

B. Decryption

C. Processing

D. None of the mentioned above

What is the correct answer?

4

Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?

A. Hill Cipher

B. Playfair cipher

C. Both a and b

D. None of the above

What is the correct answer?

4

Codes and ciphers are different ways to _____ a message.

A. Encrypt

B. Decrypt

C. Both A and B

D. All of the mentioned above

What is the correct answer?

4

Which of the following options is not correct according to the definition of the Hash Function?

A. Hash Functions are mathematical functions

B. They compress the input values

C. The hash functions work on arbitrary length input but produces fixed length output.

D. None of the above

What is the correct answer?

4

Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.

A. Quantum adversaries

B. Quantum integration

C. Quantum hash

D. None of the mentioned above

What is the correct answer?

4

An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.

A. Randomize the decryption

B. Randomize the encryption

C. Minimize and maximize the randomization

D. None of the mentioned above

What is the correct answer?

4

For which of the following should EBC (Electronic Code Book) process not be used for encryption?

A. For large block sizes

B. For fixed block sizes

C. For small block sizes

D. None of the above

What is the correct answer?

4

Public key cryptography is a ... cryptosystem

A. Symmetric

B. Asymmetric

C. Symmetric & Asymmetric both

D. None of these

What is the correct answer?

4

Which of the following modes of operation in DES is used for operating?

A. Cipher Feedback Mode (CFB)

B. Cipher Block chaining (CBC)

C. Electronic code book (ECB)

D. Output Feedback Modes (OFB)

What is the correct answer?

4

A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?

A. An integer values

B. A square matrix

C. An array of characters (i.e. a string)

D. All of the above

What is the correct answer?

4

Cryptographic hashing provides a barrier to potential _______.

A. Attackers

B. Sender

C. Receiver

D. None of the mentioned above

What is the correct answer?

4

In Cipher block chaining mode, the current plaintext block is added to the ____.

A. Previous ciphertext block

B. Next ciphertext block

C. Middle ciphertext block

D. None of the mentioned above

What is the correct answer?

4

Encryption algorithms are divided into two categories based on the ______.

A. Output type

B. Input type

C. Process type

D. All of the mentioned above

What is the correct answer?

4

Which of the following is not a type of symmetric-key cryptography technique?

A. Caesar cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman cipher

D. Playfair cipher

What is the correct answer?

4

The Data Encryption Standard (DES) is an example of a ...

A. Conventional cryptosystem

B. Asymmetric cryptosystem

C. Caesar's cryptosystem

D. All of these

What is the correct answer?

4

Block ciphers accumulate symbols in a message of a ______.

A. Fixed size

B. Variable

C. Integration

D. All of the mentioned above

What is the correct answer?

4

How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?

A. 64 sub- keys

B. 48 sub- keys

C. 52 sub- keys

D. Only one key and no subkeys

What is the correct answer?

4

Amongst which of the following is /are good for Hashes,

A. Password protection

B. Data integrity / file verification

C. Digital signatures and virus signatures

D. All of the mentioned above

What is the correct answer?

4

Hash functions are mathematical functions that transform or map a given set of data into a bit string of fixed size, also known as the hash value.

A. Hash value

B. Map value

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

Conventional cryptography also known as ... encryption.

A. asymmetric-key

B. logical-key

C. symmetric-key

D. None of these

What is the correct answer?

4

Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,

A. The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment

B. Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon

C. Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent

D. All of the mentioned above

What is the correct answer?

4

RSA algorithm is ____ cryptography algorithm.

A. Systematic

B. Symmetric

C. Asymmetric

D. None of the mentioned above

What is the correct answer?

4

Which of the following ciphers uses asymmetric key cryptography?

A. Rail Fence Cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman Cipher

D. None of the above

What is the correct answer?

4

What is the output of a cryptographic hash function means?

A. A variable set of bits

B. A fixed set of bits, derived from one-way mathematical operations

C. An output which may be easily discovered by an adversary

D. Outputs of such functions are of no importance

What is the correct answer?

4

What is the block size of plain text in SHA- 512 algorithm?

A. 512 bits

B. 1024 bits

C. 2048 bits

D. None of the above