Reverse order
Next order
Both A and B
All of the mentioned above
A. Reverse order
RSA
SHA-1
DES
MD5
Each ciphertext block gets 'fed back' into the encryption process
Encrypt the next plaintext block
Both A and B
None of the mentioned above
Output type
Input type
Process type
All of the mentioned above
Abstract view
Mathematical function
Both A and B
None of the mentioned above
asymmetric-key
logical-key
symmetric-key
None of these
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
For large block sizes
For fixed block sizes
For small block sizes
None of the above
Reverse order
Next order
Both A and B
All of the mentioned above
Confidentiality
Authenticityn
Data integrityn
All of these
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
Masquerade
Modification of message
Denial of service
Traffic analysis
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
Authentication
Non repudiation
Data Integrity
All of the above
16 bits
64 bits
32 bits
All of the mentioned above
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
Passcode or a password
Developed code
Network set
None of the mentioned above
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
Yes
No
Can't be determined
Data insufficient
Hash value
Hash Code
Message Digest
All of the above
Encrypt
Decrypt
Both A and B
All of the mentioned above
Next block
Previous block
Middle block
All of the mentioned above
Variety
Validity
Veracity
None of the mentioned above
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above