Related Questions
What is the correct answer?
4
What is the block size of plain text in SHA- 512 algorithm?
What is the correct answer?
4
When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?
D. xor of subkey with function f
What is the correct answer?
4
Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?
What is the correct answer?
4
Which of the following options is not correct according to the definition of the Hash Function?
A. Hash Functions are mathematical functions
B. They compress the input values
C. The hash functions work on arbitrary length input but produces fixed length output.
What is the correct answer?
4
With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.
D. None of the mentioned above
What is the correct answer?
4
The process of decryption of an AES ciphertext is similar to the encryption process in the ______.
D. All of the mentioned above
What is the correct answer?
4
Which of the following are used to create a message digest by the network security protocols?
What is the correct answer?
4
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?
What is the correct answer?
4
For which of the following should EBC (Electronic Code Book) process not be used for encryption?
What is the correct answer?
4
With reference to Cipher Feedback (CFB) Mode, amongst which of the following is /are true,
A. Each ciphertext block gets 'fed back' into the encryption process
B. Encrypt the next plaintext block
D. None of the mentioned above
What is the correct answer?
4
Which of the following is a mode of operation for the Block ciphers in cryptography?
A. Electronic Code Book (ECB)
B. Cipher Block Chaining (CBC)
What is the correct answer?
4
_____ and encryption is two separate cryptographic processes.
D. None of the mentioned above
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol
What is the correct answer?
4
Digital Signatures authenticates the sender by appending the original message with the ____ digest.
D. None of the mentioned above
What is the correct answer?
4
Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?
A. It requires large block size
B. Padding is done to make the plain text divisible into blocks of fixed size
C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
What is the correct answer?
4
Which of the following ciphers is a block cipher?
What is the correct answer?
4
The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?
A. 128 key size: 10 rounds
B. 192 key size: 12 rounds
C. 256 key size: 14 rounds
What is the correct answer?
4
Block ciphers accumulate symbols in a message of a ______.
D. All of the mentioned above
What is the correct answer?
4
The Data Encryption Standard (DES) is an example of a ...
A. Conventional cryptosystem
B. Asymmetric cryptosystem
What is the correct answer?
4
Which two principles of quantum mechanics on which quantum cryptography are dependent?
A. Heisenberg Uncertainty Principle and Photon Polarization Principle.
B. Fundamental Principle and Bohr's Model Principle
C. Momentum Principle and Photons Principle
D. Planck's Principle and Fundamental Principle
What is the correct answer?
4
Cipher block chaining or CBC is an advancement made on _____.
D. All of the mentioned above
What is the correct answer?
4
How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?
D. Only one key and no subkeys
What is the correct answer?
4
All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options
What is the correct answer?
4
An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.
A. Randomize the decryption
B. Randomize the encryption
C. Minimize and maximize the randomization
D. None of the mentioned above
What is the correct answer?
4
The private key in asymmetric key cryptography is kept by
D. All the connected devices to the network
What is the correct answer?
4
Which possible Attacks in Quantum Cryptography can take place?
A. Possible Attacks in Quantum Cryptography and Birthday Attack
B. Birthday attack and Boomerang attack
C. Brute force attack and Faked-State-Attack
D. Possible Attacks in Quantum Cryptography and Faked-State Attack
What is the correct answer?
4
Cipher in cryptography is
B. Algorithm for performing encryption and decryption
C. Both algorithm for performing encryption and decryption and encrypted message
What is the correct answer?
4
How many elements are used in cryptography tools?
What is the correct answer?
4
The above steps are performed in each round of which of the following ciphers?
B. Data Encryption Standard (DES)
C. Advance Encryption Standard (AES)
What is the correct answer?
4
What does IDEA stand for in the world of cryptography?orThe IDEA word in the IDEA algorithm is the abbreviation for which of the following?
A. Independent Decryption Environment Analysis
B. International Defense Encryption Area
C. International Data Encryption Algorithm