Home
Current Affairs January 2024

What is the correct answer?

4

RSA algorithm is ____ cryptography algorithm.

A. Systematic

B. Symmetric

C. Asymmetric

D. None of the mentioned above

Correct Answer :

C. Asymmetric


The RSA algorithm is a symmetric cryptography algorithm that uses a random number generator. Asymmetric refers to the fact that it operates on two separate keys, namely the Public Key and the Private Key.

Related Questions

What is the correct answer?

4

Amongst which of the following is/ are showing the goodness of electronic code book,

A. Parallel encryption of blocks of bits is possible

B. It is a faster way of encryption.

C. Simple way of the block cipher.

D. All of the mentioned above

What is the correct answer?

4

In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.

A. 5 similar rounds having 2 pair ; every alternate

B. 9 ; the last

C. 8 ; the first and last

D. 10 ; no

What is the correct answer?

4

Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,

A. The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment

B. Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon

C. Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent

D. All of the mentioned above

What is the correct answer?

4

A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?

A. An integer values

B. A square matrix

C. An array of characters (i.e. a string)

D. All of the above

What is the correct answer?

4

_____ and ______ protocol models can be extended to Entangled particles theory.

A. SARG04 and HTTP

B. FTP and SSP

C. SARG04 and SSP

D. HTTP and FTP

What is the correct answer?

4

Which of the following is not a type of symmetric-key cryptography technique?

A. Caesar cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman cipher

D. Playfair cipher

What is the correct answer?

4

Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.

A. 16 bits

B. 64 bits

C. 32 bits

D. All of the mentioned above

What is the correct answer?

4

What is the output of the N 1024-bit blocks from the Nth stage in this?

A. 512 bits

B. 1024 bits

C. N x 1024bits

D. N x 512 bits

What is the correct answer?

4

Encryption algorithms are divided into two categories based on the ______.

A. Output type

B. Input type

C. Process type

D. All of the mentioned above

What is the correct answer?

4

To encrypt the plaintext, a cryptographic algorithm works in combination with a key...

A. Word, number, or phrase

B. Special Symbols

C. Function Keys

D. All of these

What is the correct answer?

4

Hash functions are mathematical functions that transform or map a given set of data into a bit string of fixed size, also known as the hash value.

A. Hash value

B. Map value

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.

A. 1024

B. 512

C. 256

D. 1248

What is the correct answer?

4

When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?

A. f function

B. permutation p

C. swapping of halves

D. xor of subkey with function f

What is the correct answer?

4

Hash functions are used in ___ and have variable levels of complexity and difficulty.

A. System approach

B. Cyber safe

C. Cryptography

D. None of the mentioned above

What is the correct answer?

4

Among the following given options, chose the strongest encryption technique?

A. DES ( Data Encryption Standard)

B. Double DES

C. Triple DES

D. AES (Advance Encryption Standard)

What is the correct answer?

4

Cipher block chaining or CBC is an advancement made on _____.

A. Electronic Code Book

B. Decrypted code

C. System engineering

D. All of the mentioned above

What is the correct answer?

4

A hash function is a _____ that converts a numerical input value into another compressed numerical value.

A. Abstract view

B. Mathematical function

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?

A. The input text is divided into two parts: one being left half and another one being right half.

B. Swapping of the left and right halves are performed after each round.

C. The plain text is converted into a matrix form first

D. None of the above

What is the correct answer?

4

Amongst which of the following is /are good for Hashes,

A. Password protection

B. Data integrity / file verification

C. Digital signatures and virus signatures

D. All of the mentioned above

What is the correct answer?

4

Amongst which of the following is / are true with reference to the rounds in AES

A. Byte Substitution

B. Shift Row

C. Mix Column and Key Addition

D. All of the mentioned above

What is the correct answer?

4

Digital Signatures authenticates the sender by appending the original message with the ____ digest.

A. Decrypted message

B. Encrypted message

C. Systematic approach

D. None of the mentioned above

What is the correct answer?

4

Which of the following ciphers uses asymmetric key cryptography?

A. Rail Fence Cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman Cipher

D. None of the above

What is the correct answer?

4

Which of the following cannot be chosen as a key in the Caesar cipher?

A. An integer

B. An alphabet (A-Z or a-z)

C. A string

D. None of the above

What is the correct answer?

4

The above steps are performed in each round of which of the following ciphers?

A. Rail fence cipher

B. Data Encryption Standard (DES)

C. Advance Encryption Standard (AES)

D. None of the above

What is the correct answer?

4

For which of the following should EBC (Electronic Code Book) process not be used for encryption?

A. For large block sizes

B. For fixed block sizes

C. For small block sizes

D. None of the above

What is the correct answer?

4

All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options

A. i.

B. iii.

C. All of the mentioned

D. None of the mentioned

What is the correct answer?

4

Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?

A. Hill Cipher

B. Playfair cipher

C. Both a and b

D. None of the above

What is the correct answer?

4

Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?

A. CBC (Cipher Block Chaining)

B. ECB (Electronic Code Book)

C. CFB (Cipher text Feed Back)

D. All of the above

What is the correct answer?

4

Which is the cryptographic protocol that is used to protect an HTTP connection?

A. Resource reservation protocol

B. SCTP

C. TLS

D. ECN

What is the correct answer?

4

_____ ciphers encrypt uniformly sized blocks of data.

A. Set

B. Block

C. Rack

D. All of the mentioned above