128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
D. All of the above
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Each ciphertext block gets 'fed back' into the encryption process
Encrypt the next plaintext block
Both A and B
None of the mentioned above
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
Passcode or a password
Developed code
Network set
None of the mentioned above
Avalanche effect
Completeness
Both a. and b.
None of the above
512 bits
1024 bits
N x 1024bits
N x 512 bits
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
Edited
Main Text
Plain text
All of the mentioned above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
Variety
Validity
Veracity
None of the mentioned above
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
42
93
114
103
128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
Different
Same
Both A and B
None of the mentioned above
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
1024
512
256
1248
Next block
Previous block
Middle block
All of the mentioned above
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
Authentication
Non repudiation
Data Integrity
All of the above
Hashing
Decryption
Processing
None of the mentioned above
Cryptography
Algorithm
Data flow
None of these