Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
C. Advance Encryption Standard (AES)
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
Cryptography
Algorithm
Data flow
None of these
Yes
No
Can't be determined
Data insufficient
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
System approach
Cyber safe
Cryptography
None of the mentioned above
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Encrypt
Decrypt
Both A and B
All of the mentioned above
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
UWP
NUS
WUP
QSL
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
Edited
Main Text
Plain text
All of the mentioned above
Avalanche effect
Completeness
Both a. and b.
None of the above
Attackers
Sender
Receiver
None of the mentioned above
Output type
Input type
Process type
All of the mentioned above
Fixed size
Variable
Integration
All of the mentioned above
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
Each ciphertext block gets 'fed back' into the encryption process
Encrypt the next plaintext block
Both A and B
None of the mentioned above
Confidentiality
Authenticityn
Data integrityn
All of these
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
For large block sizes
For fixed block sizes
For small block sizes
None of the above
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
Resource reservation protocol
SCTP
TLS
ECN
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
Sender
Receiver
Sender and receiver
All the connected devices to the network
Variety
Validity
Veracity
None of the mentioned above
Next block
Previous block
Middle block
All of the mentioned above
1
4
6
3
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher