Related Questions
What is the correct answer?
4
What is the output of the N 1024-bit blocks from the Nth stage in this?
What is the correct answer?
4
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?
What is the correct answer?
4
A hash function is a _____ that converts a numerical input value into another compressed numerical value.
D. None of the mentioned above
What is the correct answer?
4
For which of the following should EBC (Electronic Code Book) process not be used for encryption?
What is the correct answer?
4
Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?
A. It requires large block size
B. Padding is done to make the plain text divisible into blocks of fixed size
C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
What is the correct answer?
4
Which of the following is not a type of symmetric-key cryptography technique?
B. Data Encryption Standard (DES)
What is the correct answer?
4
A mechanism used to encrypt and decrypt data.
What is the correct answer?
4
We are provided the plain text SUN. You need to convert the given plain text into ciphertext under the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the given text if the key is 2?
What is the correct answer?
4
Which of the following is a mode of operation for the Block ciphers in cryptography?
A. Electronic Code Book (ECB)
B. Cipher Block Chaining (CBC)
What is the correct answer?
4
With reference to Cipher Feedback (CFB) Mode, amongst which of the following is /are true,
A. Each ciphertext block gets 'fed back' into the encryption process
B. Encrypt the next plaintext block
D. None of the mentioned above
What is the correct answer?
4
Digital Signatures authenticates the sender by appending the original message with the ____ digest.
D. None of the mentioned above
What is the correct answer?
4
Which of the following is not a principle of data security?
What is the correct answer?
4
Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____.
D. None of the mentioned above
What is the correct answer?
4
A cryptographic hash function is an equation used to verify the ____ of data.
D. None of the mentioned above
What is the correct answer?
4
How many elements are used in cryptography tools?
What is the correct answer?
4
Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?
A. CBC is a mode of operation for stream ciphers.
B. Initialization vector (IV) is used in CBC in the initial phase.
C. It has better resistive nature towards cryptanalysis than ECB
What is the correct answer?
4
The greatest threat is to public cryptography or asymmetric algorithms used for ____.
A. Digital signatures and
D. None of the mentioned above
What is the correct answer?
4
Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
What is the correct answer?
4
Cryptographic hashing provides a barrier to potential _______.
D. None of the mentioned above
What is the correct answer?
4
Which of the following options is not correct according to the definition of the Hash Function?
A. Hash Functions are mathematical functions
B. They compress the input values
C. The hash functions work on arbitrary length input but produces fixed length output.
What is the correct answer?
4
_____ ciphers encrypt uniformly sized blocks of data.
D. All of the mentioned above
What is the correct answer?
4
The process of decryption of an AES ciphertext is similar to the encryption process in the ______.
D. All of the mentioned above
What is the correct answer?
4
Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.
D. None of the mentioned above
What is the correct answer?
4
Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:
What is the correct answer?
4
Which one of the following algorithms is not used in asymmetric-key cryptography?
B. Electronic code book algorithm
C. Diffie-Hellman algorithm
What is the correct answer?
4
Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value?
D. Data retrieval in its original form
What is the correct answer?
4
Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?
B. Modification of message
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol
What is the correct answer?
4
Cipher in cryptography is
B. Algorithm for performing encryption and decryption
C. Both algorithm for performing encryption and decryption and encrypted message
What is the correct answer?
4
Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.
D. All of the mentioned above