Output type
Input type
Process type
All of the mentioned above
B. Input type
Confidentiality
Authenticityn
Data integrityn
All of these
128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
Abstract view
Mathematical function
Both A and B
None of the mentioned above
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above
Hashing
Decryption
Processing
None of the mentioned above
Hill Cipher
Playfair cipher
Both a and b
None of the above
Encrypt
Decrypt
Both A and B
All of the mentioned above
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
For large block sizes
For fixed block sizes
For small block sizes
None of the above
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
An integer values
A square matrix
An array of characters (i.e. a string)
All of the above
Attackers
Sender
Receiver
None of the mentioned above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
Output type
Input type
Process type
All of the mentioned above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Fixed size
Variable
Integration
All of the mentioned above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
Hash value
Map value
Both A and B
None of the mentioned above
asymmetric-key
logical-key
symmetric-key
None of these
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Systematic
Symmetric
Asymmetric
None of the mentioned above
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
512 bits
1024 bits
2048 bits
None of the above