Home
Current Affairs January 2024

What is the correct answer?

4

Security Goals of Cryptography are

A. Confidentiality

B. Authenticityn

C. Data integrityn

D. All of these

Correct Answer :

D. All of these


Confidentiality, authenticity, data integrity and non-repudiation security are the key goals of cryptography.

Related Questions

What is the correct answer?

4

With reference to Cipher Feedback (CFB) Mode, amongst which of the following is /are true,

A. Each ciphertext block gets 'fed back' into the encryption process

B. Encrypt the next plaintext block

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.

A. 16 bits

B. 64 bits

C. 32 bits

D. All of the mentioned above

What is the correct answer?

4

The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?

A. The input text is divided into two parts: one being left half and another one being right half.

B. Swapping of the left and right halves are performed after each round.

C. The plain text is converted into a matrix form first

D. None of the above

What is the correct answer?

4

Digital Signatures authenticates the sender by appending the original message with the ____ digest.

A. Decrypted message

B. Encrypted message

C. Systematic approach

D. None of the mentioned above

What is the correct answer?

4

In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.

A. Passcode or a password

B. Developed code

C. Network set

D. None of the mentioned above

What is the correct answer?

4

A mechanism used to encrypt and decrypt data.

A. Cryptography

B. Algorithm

C. Data flow

D. None of these

What is the correct answer?

4

Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____.

A. Cryptographic system

B. Cryptographic tasks

C. Decryption system

D. None of the mentioned above

What is the correct answer?

4

Hash functions are used in ___ and have variable levels of complexity and difficulty.

A. System approach

B. Cyber safe

C. Cryptography

D. None of the mentioned above

What is the correct answer?

4

Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?

A. Quantum Solution

B. Foreseen Solution

C. Cryptographic Solution

D. Block Cipher Solution

What is the correct answer?

4

When a hash function is used to provide message authentication, the hash function value is called to as:

A. Message Field

B. Message Digest

C. Message Score

D. Message Leap

What is the correct answer?

4

What does IDEA stand for in the world of cryptography?orThe IDEA word in the IDEA algorithm is the abbreviation for which of the following?

A. Independent Decryption Environment Analysis

B. International Defense Encryption Area

C. International Data Encryption Algorithm

D. None of the above

What is the correct answer?

4

Conventional cryptography also known as ... encryption.

A. asymmetric-key

B. logical-key

C. symmetric-key

D. None of these

What is the correct answer?

4

With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.

A. Different

B. Same

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

Public key cryptography is a ... cryptosystem

A. Symmetric

B. Asymmetric

C. Symmetric & Asymmetric both

D. None of these

What is the correct answer?

4

Which of the following ciphers is a block cipher?

A. Caesar cipher

B. Vernam cipher

C. Playfair cipher

D. None of the above

What is the correct answer?

4

We are provided the plain text SUN. You need to convert the given plain text into ciphertext under the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the given text if the key is 2?

A. UWP

B. NUS

C. WUP

D. QSL

What is the correct answer?

4

A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?

A. An integer values

B. A square matrix

C. An array of characters (i.e. a string)

D. All of the above

What is the correct answer?

4

Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.

A. Quantum adversaries

B. Quantum integration

C. Quantum hash

D. None of the mentioned above

What is the correct answer?

4

How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?

A. 64 sub- keys

B. 48 sub- keys

C. 52 sub- keys

D. Only one key and no subkeys

What is the correct answer?

4

Amongst which of the following is /are good for Hashes,

A. Password protection

B. Data integrity / file verification

C. Digital signatures and virus signatures

D. All of the mentioned above

What is the correct answer?

4

Decryption is a process to unveil the ______.

A. Unsecured data

B. Secured data

C. Insecure

D. None of the mentioned above

What is the correct answer?

4

Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?

A. It requires large block size

B. Padding is done to make the plain text divisible into blocks of fixed size

C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.

D. None of the above

What is the correct answer?

4

The greatest threat is to public cryptography or asymmetric algorithms used for ____.

A. Digital signatures and

B. Key exchange

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.

A. Randomize the decryption

B. Randomize the encryption

C. Minimize and maximize the randomization

D. None of the mentioned above

What is the correct answer?

4

Which of the following is a mode of operation for the Block ciphers in cryptography?

A. Electronic Code Book (ECB)

B. Cipher Block Chaining (CBC)

C. Counter (CTR) mode

D. All of the above

What is the correct answer?

4

Block ciphers accumulate symbols in a message of a ______.

A. Fixed size

B. Variable

C. Integration

D. All of the mentioned above

What is the correct answer?

4

What is the block size of plain text in SHA- 512 algorithm?

A. 512 bits

B. 1024 bits

C. 2048 bits

D. None of the above

What is the correct answer?

4

Which one of the following algorithms is not used in asymmetric-key cryptography?

A. DSA algorithm

B. Electronic code book algorithm

C. Diffie-Hellman algorithm

D. RSA algorithm

What is the correct answer?

4

Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?

A. Masquerade

B. Modification of message

C. Denial of service

D. Traffic analysis

What is the correct answer?

4

Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?

A. Avalanche effect

B. Completeness

C. Both a. and b.

D. None of the above