Related Questions
What is the correct answer?
4
What is the output of a cryptographic hash function means?
A. A variable set of bits
B. A fixed set of bits, derived from one-way mathematical operations
C. An output which may be easily discovered by an adversary
D. Outputs of such functions are of no importance
What is the correct answer?
4
How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?
D. Only one key and no subkeys
What is the correct answer?
4
_____ and ______ protocol models can be extended to Entangled particles theory.
What is the correct answer?
4
With reference to Cipher Feedback (CFB) Mode, amongst which of the following is /are true,
A. Each ciphertext block gets 'fed back' into the encryption process
B. Encrypt the next plaintext block
D. None of the mentioned above
What is the correct answer?
4
Security Goals of Cryptography are
What is the correct answer?
4
Which of the following ciphers uses asymmetric key cryptography?
B. Data Encryption Standard (DES)
What is the correct answer?
4
When a hash function is used to provide message authentication, the hash function value is called to as:
What is the correct answer?
4
Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
What is the correct answer?
4
Hash functions are mathematical functions that transform or map a given set of data into a bit string of fixed size, also known as the hash value.
D. None of the mentioned above
What is the correct answer?
4
Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?
B. Modification of message
What is the correct answer?
4
Cryptographic hashing provides a barrier to potential _______.
D. None of the mentioned above
What is the correct answer?
4
In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.
A. 5 similar rounds having 2 pair ; every alternate
C. 8 ; the first and last
What is the correct answer?
4
What is the block size of plain text in SHA- 512 algorithm?
What is the correct answer?
4
Which of the following are used to create a message digest by the network security protocols?
What is the correct answer?
4
Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?
A. CBC (Cipher Block Chaining)
B. ECB (Electronic Code Book)
C. CFB (Cipher text Feed Back)
What is the correct answer?
4
Among the following given options, chose the strongest encryption technique?
A. DES ( Data Encryption Standard)
D. AES (Advance Encryption Standard)
What is the correct answer?
4
Which of the following is not a principle of data security?
What is the correct answer?
4
What does IDEA stand for in the world of cryptography?orThe IDEA word in the IDEA algorithm is the abbreviation for which of the following?
A. Independent Decryption Environment Analysis
B. International Defense Encryption Area
C. International Data Encryption Algorithm
What is the correct answer?
4
Decryption is a process to unveil the ______.
D. None of the mentioned above
What is the correct answer?
4
In Cipher block chaining mode, the current plaintext block is added to the ____.
A. Previous ciphertext block
C. Middle ciphertext block
D. None of the mentioned above
What is the correct answer?
4
RSA algorithm is ____ cryptography algorithm.
D. None of the mentioned above
What is the correct answer?
4
What is the full-form of RSA in the RSA encryption technique?
A. Round Security Algorithm
B. Rivest, Shamir, Adleman
What is the correct answer?
4
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?
What is the correct answer?
4
A mechanism used to encrypt and decrypt data.
What is the correct answer?
4
To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
A. Word, number, or phrase
What is the correct answer?
4
Which of the following is not a type of symmetric-key cryptography technique?
B. Data Encryption Standard (DES)
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol
What is the correct answer?
4
ElGamal encryption system is an asymmetric key encryption algorithm.
A. Public-key cryptography
B. Private-key cryptography
What is the correct answer?
4
All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options
What is the correct answer?
4
Which of the following cannot be chosen as a key in the Caesar cipher?
B. An alphabet (A-Z or a-z)