The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
C. The plain text is converted into a matrix form first
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Authentication
Non repudiation
Data Integrity
All of the above
Fixed size
Variable
Integration
All of the mentioned above
512 bits
1024 bits
2048 bits
None of the above
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
1024
512
256
1248
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
Different
Same
Both A and B
None of the mentioned above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Unsecured data
Secured data
Insecure
None of the mentioned above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
For large block sizes
For fixed block sizes
For small block sizes
None of the above
Message Field
Message Digest
Message Score
Message Leap
Abstract view
Mathematical function
Both A and B
None of the mentioned above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
Hashing
Decryption
Processing
None of the mentioned above
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Xuejia Lai and James Massey
Xuejia Lai and Bruce Schneier
Xuejia Lai and Carlisle Adams
Xuejia Lai and Stafford Tavares
Masquerade
Modification of message
Denial of service
Traffic analysis
128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
Avalanche effect
Completeness
Both a. and b.
None of the above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
Hash value
Hash Code
Message Digest
All of the above
i.
iii.
All of the mentioned
None of the mentioned
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys