Home
Current Affairs January 2024

What is the correct answer?

4

The Data Encryption Standard (DES) is an example of a ...

A. Conventional cryptosystem

B. Asymmetric cryptosystem

C. Caesar's cryptosystem

D. All of these

Correct Answer :

A. Conventional cryptosystem


Related Questions

What is the correct answer?

4

Which one of the following algorithms is not used in asymmetric-key cryptography?

A. DSA algorithm

B. Electronic code book algorithm

C. Diffie-Hellman algorithm

D. RSA algorithm

What is the correct answer?

4

How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?

A. 64 sub- keys

B. 48 sub- keys

C. 52 sub- keys

D. Only one key and no subkeys

What is the correct answer?

4

Which of the following ciphers uses asymmetric key cryptography?

A. Rail Fence Cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman Cipher

D. None of the above

What is the correct answer?

4

Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value?

A. Password Check

B. Data Integrity check

C. Digital Signatures

D. Data retrieval in its original form

What is the correct answer?

4

Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.

A. Next block

B. Previous block

C. Middle block

D. All of the mentioned above

What is the correct answer?

4

Amongst which of the following is/ are showing the goodness of electronic code book,

A. Parallel encryption of blocks of bits is possible

B. It is a faster way of encryption.

C. Simple way of the block cipher.

D. All of the mentioned above

What is the correct answer?

4

Which of the following is a mode of operation for the Block ciphers in cryptography?

A. Electronic Code Book (ECB)

B. Cipher Block Chaining (CBC)

C. Counter (CTR) mode

D. All of the above

What is the correct answer?

4

When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?

A. f function

B. permutation p

C. swapping of halves

D. xor of subkey with function f

What is the correct answer?

4

Public key cryptography is a ... cryptosystem

A. Symmetric

B. Asymmetric

C. Symmetric & Asymmetric both

D. None of these

What is the correct answer?

4

To encrypt the plaintext, a cryptographic algorithm works in combination with a key...

A. Word, number, or phrase

B. Special Symbols

C. Function Keys

D. All of these

What is the correct answer?

4

What does IDEA stand for in the world of cryptography?orThe IDEA word in the IDEA algorithm is the abbreviation for which of the following?

A. Independent Decryption Environment Analysis

B. International Defense Encryption Area

C. International Data Encryption Algorithm

D. None of the above

What is the correct answer?

4

Which of the following is not a type of symmetric-key cryptography technique?

A. Caesar cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman cipher

D. Playfair cipher

What is the correct answer?

4

Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?

A. Masquerade

B. Modification of message

C. Denial of service

D. Traffic analysis

What is the correct answer?

4

With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.

A. Different

B. Same

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

Which is the cryptographic protocol that is used to protect an HTTP connection?

A. Resource reservation protocol

B. SCTP

C. TLS

D. ECN

What is the correct answer?

4

A hash function is a _____ that converts a numerical input value into another compressed numerical value.

A. Abstract view

B. Mathematical function

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

What is the output of a cryptographic hash function means?

A. A variable set of bits

B. A fixed set of bits, derived from one-way mathematical operations

C. An output which may be easily discovered by an adversary

D. Outputs of such functions are of no importance

What is the correct answer?

4

All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options

A. i.

B. iii.

C. All of the mentioned

D. None of the mentioned

What is the correct answer?

4

The greatest threat is to public cryptography or asymmetric algorithms used for ____.

A. Digital signatures and

B. Key exchange

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.

A. Randomize the decryption

B. Randomize the encryption

C. Minimize and maximize the randomization

D. None of the mentioned above

What is the correct answer?

4

Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.

A. Quantum adversaries

B. Quantum integration

C. Quantum hash

D. None of the mentioned above

What is the correct answer?

4

Which two principles of quantum mechanics on which quantum cryptography are dependent?

A. Heisenberg Uncertainty Principle and Photon Polarization Principle.

B. Fundamental Principle and Bohr's Model Principle

C. Momentum Principle and Photons Principle

D. Planck's Principle and Fundamental Principle

What is the correct answer?

4

In Cipher block chaining mode, the current plaintext block is added to the ____.

A. Previous ciphertext block

B. Next ciphertext block

C. Middle ciphertext block

D. None of the mentioned above

What is the correct answer?

4

Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:

A. 42

B. 93

C. 114

D. 103

What is the correct answer?

4

Hash functions are used in ___ and have variable levels of complexity and difficulty.

A. System approach

B. Cyber safe

C. Cryptography

D. None of the mentioned above

What is the correct answer?

4

Which of the following is /are offered by the Hash functions?

A. Authentication

B. Non repudiation

C. Data Integrity

D. All of the above

What is the correct answer?

4

Block ciphers accumulate symbols in a message of a ______.

A. Fixed size

B. Variable

C. Integration

D. All of the mentioned above

What is the correct answer?

4

_____ and encryption is two separate cryptographic processes.

A. Hashing

B. Decryption

C. Processing

D. None of the mentioned above

What is the correct answer?

4

Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?

A. Avalanche effect

B. Completeness

C. Both a. and b.

D. None of the above

What is the correct answer?

4

Which of the following is not a principle of data security?

A. Data Confidentiality

B. Data Integrity

C. Authentication

D. None of the above