Related Questions
What is the correct answer?
4
What is the full-form of RSA in the RSA encryption technique?
A. Round Security Algorithm
B. Rivest, Shamir, Adleman
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol
What is the correct answer?
4
_____ and encryption is two separate cryptographic processes.
D. None of the mentioned above
What is the correct answer?
4
Which of the following is not a type of symmetric-key cryptography technique?
B. Data Encryption Standard (DES)
What is the correct answer?
4
Which of the following is /are offered by the Hash functions?
What is the correct answer?
4
Amongst which of the following is/ are showing the goodness of electronic code book,
A. Parallel encryption of blocks of bits is possible
B. It is a faster way of encryption.
C. Simple way of the block cipher.
D. All of the mentioned above
What is the correct answer?
4
RSA algorithm is ____ cryptography algorithm.
D. None of the mentioned above
What is the correct answer?
4
Hash functions are used in ___ and have variable levels of complexity and difficulty.
D. None of the mentioned above
What is the correct answer?
4
In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.
A. 5 similar rounds having 2 pair ; every alternate
C. 8 ; the first and last
What is the correct answer?
4
Which of the following options is not correct according to the definition of the Hash Function?
A. Hash Functions are mathematical functions
B. They compress the input values
C. The hash functions work on arbitrary length input but produces fixed length output.
What is the correct answer?
4
In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.
A. Passcode or a password
D. None of the mentioned above
What is the correct answer?
4
Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value?
D. Data retrieval in its original form
What is the correct answer?
4
ElGamal encryption system is an asymmetric key encryption algorithm.
A. Public-key cryptography
B. Private-key cryptography
What is the correct answer?
4
Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:
What is the correct answer?
4
Cipher block chaining or CBC is an advancement made on _____.
D. All of the mentioned above
What is the correct answer?
4
Which of the following cannot be chosen as a key in the Caesar cipher?
B. An alphabet (A-Z or a-z)
What is the correct answer?
4
The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?
A. 128 key size: 10 rounds
B. 192 key size: 12 rounds
C. 256 key size: 14 rounds
What is the correct answer?
4
The Data Encryption Standard (DES) is an example of a ...
A. Conventional cryptosystem
B. Asymmetric cryptosystem
What is the correct answer?
4
Codes and ciphers are different ways to _____ a message.
D. All of the mentioned above
What is the correct answer?
4
Amongst which of the following is / are true with reference to the rounds in AES
C. Mix Column and Key Addition
D. All of the mentioned above
What is the correct answer?
4
What is the output of a cryptographic hash function means?
A. A variable set of bits
B. A fixed set of bits, derived from one-way mathematical operations
C. An output which may be easily discovered by an adversary
D. Outputs of such functions are of no importance
What is the correct answer?
4
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?
What is the correct answer?
4
Digital Signatures authenticates the sender by appending the original message with the ____ digest.
D. None of the mentioned above
What is the correct answer?
4
International Data Encryption Algorithm (IDEA) was developed by
A. Xuejia Lai and James Massey
B. Xuejia Lai and Bruce Schneier
C. Xuejia Lai and Carlisle Adams
D. Xuejia Lai and Stafford Tavares
What is the correct answer?
4
When a hash function is used to provide message authentication, the hash function value is called to as:
What is the correct answer?
4
The Hash Function takes an input of arbitrary length and converts it into a fixed length output.Which of the following names can we use for denoting the output of the hash function?
What is the correct answer?
4
Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.
D. All of the mentioned above
What is the correct answer?
4
How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?
D. Only one key and no subkeys
What is the correct answer?
4
_____ ciphers encrypt uniformly sized blocks of data.
D. All of the mentioned above
What is the correct answer?
4
A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?
C. An array of characters (i.e. a string)