Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
B. Asymmetric
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
Data Confidentiality
Data Integrity
Authentication
None of the above
Encrypt
Decrypt
Both A and B
All of the mentioned above
Hash value
Hash Code
Message Digest
All of the above
Xuejia Lai and James Massey
Xuejia Lai and Bruce Schneier
Xuejia Lai and Carlisle Adams
Xuejia Lai and Stafford Tavares
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Variety
Validity
Veracity
None of the mentioned above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Reverse order
Next order
Both A and B
All of the mentioned above
Sender
Receiver
Sender and receiver
All the connected devices to the network
Set
Block
Rack
All of the mentioned above
Hashing
Decryption
Processing
None of the mentioned above
512 bits
1024 bits
2048 bits
None of the above
42
93
114
103
i.
iii.
All of the mentioned
None of the mentioned
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
Different
Same
Both A and B
None of the mentioned above
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Systematic
Symmetric
Asymmetric
None of the mentioned above
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
Hill Cipher
Playfair cipher
Both a and b
None of the above