Related Questions
What is the correct answer?
4
Amongst which of the following is/ are showing the goodness of electronic code book,
A. Parallel encryption of blocks of bits is possible
B. It is a faster way of encryption.
C. Simple way of the block cipher.
D. All of the mentioned above
What is the correct answer?
4
In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.
A. 5 similar rounds having 2 pair ; every alternate
C. 8 ; the first and last
What is the correct answer?
4
Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,
A. The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
B. Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
C. Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
D. All of the mentioned above
What is the correct answer?
4
A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?
C. An array of characters (i.e. a string)
What is the correct answer?
4
_____ and ______ protocol models can be extended to Entangled particles theory.
What is the correct answer?
4
Which of the following is not a type of symmetric-key cryptography technique?
B. Data Encryption Standard (DES)
What is the correct answer?
4
Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.
D. All of the mentioned above
What is the correct answer?
4
What is the output of the N 1024-bit blocks from the Nth stage in this?
What is the correct answer?
4
Encryption algorithms are divided into two categories based on the ______.
D. All of the mentioned above
What is the correct answer?
4
To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
A. Word, number, or phrase
What is the correct answer?
4
Hash functions are mathematical functions that transform or map a given set of data into a bit string of fixed size, also known as the hash value.
D. None of the mentioned above
What is the correct answer?
4
Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
What is the correct answer?
4
When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?
D. xor of subkey with function f
What is the correct answer?
4
Hash functions are used in ___ and have variable levels of complexity and difficulty.
D. None of the mentioned above
What is the correct answer?
4
Among the following given options, chose the strongest encryption technique?
A. DES ( Data Encryption Standard)
D. AES (Advance Encryption Standard)
What is the correct answer?
4
Cipher block chaining or CBC is an advancement made on _____.
D. All of the mentioned above
What is the correct answer?
4
A hash function is a _____ that converts a numerical input value into another compressed numerical value.
D. None of the mentioned above
What is the correct answer?
4
The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?
A. The input text is divided into two parts: one being left half and another one being right half.
B. Swapping of the left and right halves are performed after each round.
C. The plain text is converted into a matrix form first
What is the correct answer?
4
Amongst which of the following is /are good for Hashes,
B. Data integrity / file verification
C. Digital signatures and virus signatures
D. All of the mentioned above
What is the correct answer?
4
Amongst which of the following is / are true with reference to the rounds in AES
C. Mix Column and Key Addition
D. All of the mentioned above
What is the correct answer?
4
Digital Signatures authenticates the sender by appending the original message with the ____ digest.
D. None of the mentioned above
What is the correct answer?
4
Which of the following ciphers uses asymmetric key cryptography?
B. Data Encryption Standard (DES)
What is the correct answer?
4
Which of the following cannot be chosen as a key in the Caesar cipher?
B. An alphabet (A-Z or a-z)
What is the correct answer?
4
The above steps are performed in each round of which of the following ciphers?
B. Data Encryption Standard (DES)
C. Advance Encryption Standard (AES)
What is the correct answer?
4
For which of the following should EBC (Electronic Code Book) process not be used for encryption?
What is the correct answer?
4
All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options
What is the correct answer?
4
Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?
What is the correct answer?
4
Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?
A. CBC (Cipher Block Chaining)
B. ECB (Electronic Code Book)
C. CFB (Cipher text Feed Back)
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol
What is the correct answer?
4
_____ ciphers encrypt uniformly sized blocks of data.
D. All of the mentioned above