Passcode or a password
Developed code
Network set
None of the mentioned above
A. Passcode or a password
Authentication
Non repudiation
Data Integrity
All of the above
System approach
Cyber safe
Cryptography
None of the mentioned above
Hash value
Hash Code
Message Digest
All of the above
42
93
114
103
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Hill Cipher
Playfair cipher
Both a and b
None of the above
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
Masquerade
Modification of message
Denial of service
Traffic analysis
Quantum Solution
Foreseen Solution
Cryptographic Solution
Block Cipher Solution
Data Confidentiality
Data Integrity
Authentication
None of the above
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
1
4
6
3
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
Public-key cryptography
Private-key cryptography
Both
None of these
Each ciphertext block gets 'fed back' into the encryption process
Encrypt the next plaintext block
Both A and B
None of the mentioned above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
Fixed size
Variable
Integration
All of the mentioned above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
Systematic
Symmetric
Asymmetric
None of the mentioned above
Variety
Validity
Veracity
None of the mentioned above
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
Edited
Main Text
Plain text
All of the mentioned above
512 bits
1024 bits
N x 1024bits
N x 512 bits
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Passcode or a password
Developed code
Network set
None of the mentioned above