42
93
114
103
C. 114
Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
Variety
Validity
Veracity
None of the mentioned above
Edited
Main Text
Plain text
All of the mentioned above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
512 bits
1024 bits
N x 1024bits
N x 512 bits
Confidentiality
Authenticityn
Data integrityn
All of these
An integer values
A square matrix
An array of characters (i.e. a string)
All of the above
Different
Same
Both A and B
None of the mentioned above
Reverse order
Next order
Both A and B
All of the mentioned above
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
Masquerade
Modification of message
Denial of service
Traffic analysis
f function
permutation p
swapping of halves
xor of subkey with function f
Unsecured data
Secured data
Insecure
None of the mentioned above
Authentication
Non repudiation
Data Integrity
All of the above
Message Field
Message Digest
Message Score
Message Leap
Hashing
Decryption
Processing
None of the mentioned above
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
Public-key cryptography
Private-key cryptography
Both
None of these
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
1
4
6
3
Data Confidentiality
Data Integrity
Authentication
None of the above
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Sender
Receiver
Sender and receiver
All the connected devices to the network
Hill Cipher
Playfair cipher
Both a and b
None of the above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)