Home
Current Affairs January 2024

What is the correct answer?

4

What is the output of a cryptographic hash function means?

A. A variable set of bits

B. A fixed set of bits, derived from one-way mathematical operations

C. An output which may be easily discovered by an adversary

D. Outputs of such functions are of no importance

Correct Answer :

B. A fixed set of bits, derived from one-way mathematical operations


The output of a cryptographic hash function means as a fixed set of bits, derived from one-way mathematical operations.

Related Questions

What is the correct answer?

4

Which of the following is not a type of symmetric-key cryptography technique?

A. Caesar cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman cipher

D. Playfair cipher

What is the correct answer?

4

In Cipher block chaining mode, the current plaintext block is added to the ____.

A. Previous ciphertext block

B. Next ciphertext block

C. Middle ciphertext block

D. None of the mentioned above

What is the correct answer?

4

All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options

A. i.

B. iii.

C. All of the mentioned

D. None of the mentioned

What is the correct answer?

4

Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?

A. Hill Cipher

B. Playfair cipher

C. Both a and b

D. None of the above

What is the correct answer?

4

Amongst which of the following is/ are showing the goodness of electronic code book,

A. Parallel encryption of blocks of bits is possible

B. It is a faster way of encryption.

C. Simple way of the block cipher.

D. All of the mentioned above

What is the correct answer?

4

Which of the following is not a principle of data security?

A. Data Confidentiality

B. Data Integrity

C. Authentication

D. None of the above

What is the correct answer?

4

For which of the following should EBC (Electronic Code Book) process not be used for encryption?

A. For large block sizes

B. For fixed block sizes

C. For small block sizes

D. None of the above

What is the correct answer?

4

Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?

A. CBC (Cipher Block Chaining)

B. ECB (Electronic Code Book)

C. CFB (Cipher text Feed Back)

D. All of the above

What is the correct answer?

4

Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.

A. Next block

B. Previous block

C. Middle block

D. All of the mentioned above

What is the correct answer?

4

The private key in asymmetric key cryptography is kept by

A. Sender

B. Receiver

C. Sender and receiver

D. All the connected devices to the network

What is the correct answer?

4

Security Goals of Cryptography are

A. Confidentiality

B. Authenticityn

C. Data integrityn

D. All of these

What is the correct answer?

4

Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.

A. 1024

B. 512

C. 256

D. 1248

What is the correct answer?

4

A hash function is a _____ that converts a numerical input value into another compressed numerical value.

A. Abstract view

B. Mathematical function

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?

A. CBC is a mode of operation for stream ciphers.

B. Initialization vector (IV) is used in CBC in the initial phase.

C. It has better resistive nature towards cryptanalysis than ECB

D. None of the above

What is the correct answer?

4

The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?

A. 128 key size: 10 rounds

B. 192 key size: 12 rounds

C. 256 key size: 14 rounds

D. All of the above

What is the correct answer?

4

Hash functions are used in ___ and have variable levels of complexity and difficulty.

A. System approach

B. Cyber safe

C. Cryptography

D. None of the mentioned above

What is the correct answer?

4

_____ and encryption is two separate cryptographic processes.

A. Hashing

B. Decryption

C. Processing

D. None of the mentioned above

What is the correct answer?

4

Decryption is a process to unveil the ______.

A. Unsecured data

B. Secured data

C. Insecure

D. None of the mentioned above

What is the correct answer?

4

What does IDEA stand for in the world of cryptography?orThe IDEA word in the IDEA algorithm is the abbreviation for which of the following?

A. Independent Decryption Environment Analysis

B. International Defense Encryption Area

C. International Data Encryption Algorithm

D. None of the above

What is the correct answer?

4

Which is the cryptographic protocol that is used to protect an HTTP connection?

A. Resource reservation protocol

B. SCTP

C. TLS

D. ECN

What is the correct answer?

4

____ is the message or data that can be readable by the sender.

A. Edited

B. Main Text

C. Plain text

D. All of the mentioned above

What is the correct answer?

4

Which of the following options is not correct according to the definition of the Hash Function?

A. Hash Functions are mathematical functions

B. They compress the input values

C. The hash functions work on arbitrary length input but produces fixed length output.

D. None of the above

What is the correct answer?

4

ElGamal encryption system is an asymmetric key encryption algorithm.

A. Public-key cryptography

B. Private-key cryptography

C. Both

D. None of these

What is the correct answer?

4

What is the full-form of RSA in the RSA encryption technique?

A. Round Security Algorithm

B. Rivest, Shamir, Adleman

C. Robert, Shamir, Addie

D. None of the above

What is the correct answer?

4

Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:

A. 42

B. 93

C. 114

D. 103

What is the correct answer?

4

Block ciphers accumulate symbols in a message of a ______.

A. Fixed size

B. Variable

C. Integration

D. All of the mentioned above

What is the correct answer?

4

To encrypt the plaintext, a cryptographic algorithm works in combination with a key...

A. Word, number, or phrase

B. Special Symbols

C. Function Keys

D. All of these

What is the correct answer?

4

An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.

A. Randomize the decryption

B. Randomize the encryption

C. Minimize and maximize the randomization

D. None of the mentioned above

What is the correct answer?

4

Which of the following are used to create a message digest by the network security protocols?

A. RSA

B. SHA-1

C. DES

D. MD5

What is the correct answer?

4

A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?

A. An integer values

B. A square matrix

C. An array of characters (i.e. a string)

D. All of the above