Related Questions
What is the correct answer?
4
Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?
A. CBC is a mode of operation for stream ciphers.
B. Initialization vector (IV) is used in CBC in the initial phase.
C. It has better resistive nature towards cryptanalysis than ECB
What is the correct answer?
4
Block ciphers accumulate symbols in a message of a ______.
D. All of the mentioned above
What is the correct answer?
4
When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?
D. xor of subkey with function f
What is the correct answer?
4
In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.
A. 5 similar rounds having 2 pair ; every alternate
C. 8 ; the first and last
What is the correct answer?
4
The above steps are performed in each round of which of the following ciphers?
B. Data Encryption Standard (DES)
C. Advance Encryption Standard (AES)
What is the correct answer?
4
Hash functions are used in ___ and have variable levels of complexity and difficulty.
D. None of the mentioned above
What is the correct answer?
4
A hash function is a _____ that converts a numerical input value into another compressed numerical value.
D. None of the mentioned above
What is the correct answer?
4
Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.
D. None of the mentioned above
What is the correct answer?
4
Which of the following is not a principle of data security?
What is the correct answer?
4
The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?
A. The input text is divided into two parts: one being left half and another one being right half.
B. Swapping of the left and right halves are performed after each round.
C. The plain text is converted into a matrix form first
What is the correct answer?
4
Which of the following ciphers is a block cipher?
What is the correct answer?
4
A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?
C. An array of characters (i.e. a string)
What is the correct answer?
4
Cipher block chaining or CBC is an advancement made on _____.
D. All of the mentioned above
What is the correct answer?
4
Conventional cryptography also known as ... encryption.
What is the correct answer?
4
In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.
A. Passcode or a password
D. None of the mentioned above
What is the correct answer?
4
____ is the message or data that can be readable by the sender.
D. All of the mentioned above
What is the correct answer?
4
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?
What is the correct answer?
4
What is the output of the N 1024-bit blocks from the Nth stage in this?
What is the correct answer?
4
To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
A. Word, number, or phrase
What is the correct answer?
4
Cipher in cryptography is
B. Algorithm for performing encryption and decryption
C. Both algorithm for performing encryption and decryption and encrypted message
What is the correct answer?
4
The Data Encryption Standard (DES) is an example of a ...
A. Conventional cryptosystem
B. Asymmetric cryptosystem
What is the correct answer?
4
With reference to Cipher Feedback (CFB) Mode, amongst which of the following is /are true,
A. Each ciphertext block gets 'fed back' into the encryption process
B. Encrypt the next plaintext block
D. None of the mentioned above
What is the correct answer?
4
The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?
A. 128 key size: 10 rounds
B. 192 key size: 12 rounds
C. 256 key size: 14 rounds
What is the correct answer?
4
Which of the following is not a type of symmetric-key cryptography technique?
B. Data Encryption Standard (DES)
What is the correct answer?
4
Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?
A. CBC (Cipher Block Chaining)
B. ECB (Electronic Code Book)
C. CFB (Cipher text Feed Back)
What is the correct answer?
4
Which of the following cannot be chosen as a key in the Caesar cipher?
B. An alphabet (A-Z or a-z)
What is the correct answer?
4
Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:
What is the correct answer?
4
A mechanism used to encrypt and decrypt data.
What is the correct answer?
4
You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,
Is the given matrix 'A', a valid key to be used for encryption?
What is the correct answer?
4
Encryption algorithms are divided into two categories based on the ______.
D. All of the mentioned above