Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
C. International Data Encryption Algorithm
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
Sender
Receiver
Sender and receiver
All the connected devices to the network
Reverse order
Next order
Both A and B
All of the mentioned above
Unsecured data
Secured data
Insecure
None of the mentioned above
Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
Fixed size
Variable
Integration
All of the mentioned above
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above
i.
iii.
All of the mentioned
None of the mentioned
Output type
Input type
Process type
All of the mentioned above
Hashing
Decryption
Processing
None of the mentioned above
16 bits
64 bits
32 bits
All of the mentioned above
For large block sizes
For fixed block sizes
For small block sizes
None of the above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
Variety
Validity
Veracity
None of the mentioned above
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
f function
permutation p
swapping of halves
xor of subkey with function f
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
42
93
114
103
UWP
NUS
WUP
QSL
Avalanche effect
Completeness
Both a. and b.
None of the above
Public-key cryptography
Private-key cryptography
Both
None of these
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
asymmetric-key
logical-key
symmetric-key
None of these
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher