64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
C. 52 sub- keys
For large block sizes
For fixed block sizes
For small block sizes
None of the above
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Avalanche effect
Completeness
Both a. and b.
None of the above
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
Variety
Validity
Veracity
None of the mentioned above
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
Yes
No
Can't be determined
Data insufficient
An integer values
A square matrix
An array of characters (i.e. a string)
All of the above
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Authentication
Non repudiation
Data Integrity
All of the above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
Hash value
Hash Code
Message Digest
All of the above
16 bits
64 bits
32 bits
All of the mentioned above
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
Each ciphertext block gets 'fed back' into the encryption process
Encrypt the next plaintext block
Both A and B
None of the mentioned above
Output type
Input type
Process type
All of the mentioned above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
Unsecured data
Secured data
Insecure
None of the mentioned above
Message Field
Message Digest
Message Score
Message Leap
Encrypt
Decrypt
Both A and B
All of the mentioned above