5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
B. 9 ; the last
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
42
93
114
103
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
For large block sizes
For fixed block sizes
For small block sizes
None of the above
Different
Same
Both A and B
None of the mentioned above
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
Hash value
Map value
Both A and B
None of the mentioned above
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Set
Block
Rack
All of the mentioned above
RSA
SHA-1
DES
MD5
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
Fixed size
Variable
Integration
All of the mentioned above
512 bits
1024 bits
2048 bits
None of the above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Data Confidentiality
Data Integrity
Authentication
None of the above
Word, number, or phrase
Special Symbols
Function Keys
All of these
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
asymmetric-key
logical-key
symmetric-key
None of these
Hash value
Hash Code
Message Digest
All of the above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
An integer values
A square matrix
An array of characters (i.e. a string)
All of the above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no