512 bits
1024 bits
N x 1024bits
N x 512 bits
A. 512 bits
512 bits
1024 bits
2048 bits
None of the above
Word, number, or phrase
Special Symbols
Function Keys
All of these
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
Fixed size
Variable
Integration
All of the mentioned above
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
1
4
6
3
asymmetric-key
logical-key
symmetric-key
None of these
Hill Cipher
Playfair cipher
Both a and b
None of the above
1024
512
256
1248
Authentication
Non repudiation
Data Integrity
All of the above
Attackers
Sender
Receiver
None of the mentioned above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
RSA
SHA-1
DES
MD5
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
512 bits
1024 bits
N x 1024bits
N x 512 bits
UWP
NUS
WUP
QSL
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Cryptography
Algorithm
Data flow
None of these
Different
Same
Both A and B
None of the mentioned above
For large block sizes
For fixed block sizes
For small block sizes
None of the above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
Hashing
Decryption
Processing
None of the mentioned above
Reverse order
Next order
Both A and B
All of the mentioned above
Edited
Main Text
Plain text
All of the mentioned above