Home
Current Affairs January 2024

What is the correct answer?

4

Public key cryptography is a ... cryptosystem

A. Symmetric

B. Asymmetric

C. Symmetric & Asymmetric both

D. None of these

Correct Answer :

B. Asymmetric


Asymmetric is a public key cryptography.

Related Questions

What is the correct answer?

4

The above steps are performed in each round of which of the following ciphers?

A. Rail fence cipher

B. Data Encryption Standard (DES)

C. Advance Encryption Standard (AES)

D. None of the above

What is the correct answer?

4

Which of the following is not a principle of data security?

A. Data Confidentiality

B. Data Integrity

C. Authentication

D. None of the above

What is the correct answer?

4

Codes and ciphers are different ways to _____ a message.

A. Encrypt

B. Decrypt

C. Both A and B

D. All of the mentioned above

What is the correct answer?

4

The Hash Function takes an input of arbitrary length and converts it into a fixed length output.Which of the following names can we use for denoting the output of the hash function?

A. Hash value

B. Hash Code

C. Message Digest

D. All of the above

What is the correct answer?

4

International Data Encryption Algorithm (IDEA) was developed by

A. Xuejia Lai and James Massey

B. Xuejia Lai and Bruce Schneier

C. Xuejia Lai and Carlisle Adams

D. Xuejia Lai and Stafford Tavares

What is the correct answer?

4

Which of the following is not a type of symmetric-key cryptography technique?

A. Caesar cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman cipher

D. Playfair cipher

What is the correct answer?

4

The Data Encryption Standard (DES) is an example of a ...

A. Conventional cryptosystem

B. Asymmetric cryptosystem

C. Caesar's cryptosystem

D. All of these

What is the correct answer?

4

A cryptographic hash function is an equation used to verify the ____ of data.

A. Variety

B. Validity

C. Veracity

D. None of the mentioned above

What is the correct answer?

4

Among the following given options, chose the strongest encryption technique?

A. DES ( Data Encryption Standard)

B. Double DES

C. Triple DES

D. AES (Advance Encryption Standard)

What is the correct answer?

4

Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,

A. The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment

B. Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon

C. Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent

D. All of the mentioned above

What is the correct answer?

4

The process of decryption of an AES ciphertext is similar to the encryption process in the ______.

A. Reverse order

B. Next order

C. Both A and B

D. All of the mentioned above

What is the correct answer?

4

The private key in asymmetric key cryptography is kept by

A. Sender

B. Receiver

C. Sender and receiver

D. All the connected devices to the network

What is the correct answer?

4

_____ ciphers encrypt uniformly sized blocks of data.

A. Set

B. Block

C. Rack

D. All of the mentioned above

What is the correct answer?

4

_____ and encryption is two separate cryptographic processes.

A. Hashing

B. Decryption

C. Processing

D. None of the mentioned above

What is the correct answer?

4

What is the block size of plain text in SHA- 512 algorithm?

A. 512 bits

B. 1024 bits

C. 2048 bits

D. None of the above

What is the correct answer?

4

Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:

A. 42

B. 93

C. 114

D. 103

What is the correct answer?

4

All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options

A. i.

B. iii.

C. All of the mentioned

D. None of the mentioned

What is the correct answer?

4

Amongst which of the following is/ are showing the goodness of electronic code book,

A. Parallel encryption of blocks of bits is possible

B. It is a faster way of encryption.

C. Simple way of the block cipher.

D. All of the mentioned above

What is the correct answer?

4

With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.

A. Different

B. Same

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.

A. Quantum adversaries

B. Quantum integration

C. Quantum hash

D. None of the mentioned above

What is the correct answer?

4

Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?

A. CBC is a mode of operation for stream ciphers.

B. Initialization vector (IV) is used in CBC in the initial phase.

C. It has better resistive nature towards cryptanalysis than ECB

D. None of the above

What is the correct answer?

4

RSA algorithm is ____ cryptography algorithm.

A. Systematic

B. Symmetric

C. Asymmetric

D. None of the mentioned above

What is the correct answer?

4

Which of the following is not a property of Hash Function?

A. Pre-Image Resistance

B. Compression

C. Fixed Length Output

D. None of the above

What is the correct answer?

4

Cipher in cryptography is

A. Encrypted message

B. Algorithm for performing encryption and decryption

C. Both algorithm for performing encryption and decryption and encrypted message

D. Decrypted message

What is the correct answer?

4

Which two principles of quantum mechanics on which quantum cryptography are dependent?

A. Heisenberg Uncertainty Principle and Photon Polarization Principle.

B. Fundamental Principle and Bohr's Model Principle

C. Momentum Principle and Photons Principle

D. Planck's Principle and Fundamental Principle

What is the correct answer?

4

Which of the following ciphers uses asymmetric key cryptography?

A. Rail Fence Cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman Cipher

D. None of the above

What is the correct answer?

4

Digital Signatures authenticates the sender by appending the original message with the ____ digest.

A. Decrypted message

B. Encrypted message

C. Systematic approach

D. None of the mentioned above

What is the correct answer?

4

Which of the following cannot be chosen as a key in the Caesar cipher?

A. An integer

B. An alphabet (A-Z or a-z)

C. A string

D. None of the above

What is the correct answer?

4

Which possible Attacks in Quantum Cryptography can take place?

A. Possible Attacks in Quantum Cryptography and Birthday Attack

B. Birthday attack and Boomerang attack

C. Brute force attack and Faked-State-Attack

D. Possible Attacks in Quantum Cryptography and Faked-State Attack

What is the correct answer?

4

Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?

A. Hill Cipher

B. Playfair cipher

C. Both a and b

D. None of the above