Related Questions
What is the correct answer?
4
The Hash Function takes an input of arbitrary length and converts it into a fixed length output.Which of the following names can we use for denoting the output of the hash function?
What is the correct answer?
4
The process of decryption of an AES ciphertext is similar to the encryption process in the ______.
D. All of the mentioned above
What is the correct answer?
4
With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.
D. None of the mentioned above
What is the correct answer?
4
Encryption algorithms are divided into two categories based on the ______.
D. All of the mentioned above
What is the correct answer?
4
Which of the following is not a principle of data security?
What is the correct answer?
4
A mechanism used to encrypt and decrypt data.
What is the correct answer?
4
What is the output of the N 1024-bit blocks from the Nth stage in this?
What is the correct answer?
4
Which of the following options correctly defines the Brute force attack?
A. Brutally forcing the user to share the useful information like pins and passwords.
B. Trying every possible key to decrypt the message.
C. One entity pretends to be some other entity
D. The message or information is modified before sending it to the receiver.
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol
What is the correct answer?
4
Which of the following is /are offered by the Hash functions?
What is the correct answer?
4
Which of the following modes of operation in DES is used for operating?
A. Cipher Feedback Mode (CFB)
B. Cipher Block chaining (CBC)
C. Electronic code book (ECB)
D. Output Feedback Modes (OFB)
What is the correct answer?
4
Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?
A. CBC (Cipher Block Chaining)
B. ECB (Electronic Code Book)
C. CFB (Cipher text Feed Back)
What is the correct answer?
4
What is the full-form of RSA in the RSA encryption technique?
A. Round Security Algorithm
B. Rivest, Shamir, Adleman
What is the correct answer?
4
When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?
D. xor of subkey with function f
What is the correct answer?
4
Amongst which of the following is/ are showing the goodness of electronic code book,
A. Parallel encryption of blocks of bits is possible
B. It is a faster way of encryption.
C. Simple way of the block cipher.
D. All of the mentioned above
What is the correct answer?
4
Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?
A. CBC is a mode of operation for stream ciphers.
B. Initialization vector (IV) is used in CBC in the initial phase.
C. It has better resistive nature towards cryptanalysis than ECB
What is the correct answer?
4
Which of the following cannot be chosen as a key in the Caesar cipher?
B. An alphabet (A-Z or a-z)
What is the correct answer?
4
Hash functions are used in ___ and have variable levels of complexity and difficulty.
D. None of the mentioned above
What is the correct answer?
4
Hash functions are mathematical functions that transform or map a given set of data into a bit string of fixed size, also known as the hash value.
D. None of the mentioned above
What is the correct answer?
4
Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.
D. All of the mentioned above
What is the correct answer?
4
Digital Signatures authenticates the sender by appending the original message with the ____ digest.
D. None of the mentioned above
What is the correct answer?
4
Which of the following is a mode of operation for the Block ciphers in cryptography?
A. Electronic Code Book (ECB)
B. Cipher Block Chaining (CBC)
What is the correct answer?
4
In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.
A. Passcode or a password
D. None of the mentioned above
What is the correct answer?
4
You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,
Is the given matrix 'A', a valid key to be used for encryption?
What is the correct answer?
4
Which one of the following algorithms is not used in asymmetric-key cryptography?
B. Electronic code book algorithm
C. Diffie-Hellman algorithm
What is the correct answer?
4
Codes and ciphers are different ways to _____ a message.
D. All of the mentioned above
What is the correct answer?
4
How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?
D. Only one key and no subkeys
What is the correct answer?
4
The Data Encryption Standard (DES) is an example of a ...
A. Conventional cryptosystem
B. Asymmetric cryptosystem
What is the correct answer?
4
Public key cryptography is a ... cryptosystem
C. Symmetric & Asymmetric both
What is the correct answer?
4
Which possible Attacks in Quantum Cryptography can take place?
A. Possible Attacks in Quantum Cryptography and Birthday Attack
B. Birthday attack and Boomerang attack
C. Brute force attack and Faked-State-Attack
D. Possible Attacks in Quantum Cryptography and Faked-State Attack