Message Field
Message Digest
Message Score
Message Leap
B. Message Digest
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
1
4
6
3
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
Xuejia Lai and James Massey
Xuejia Lai and Bruce Schneier
Xuejia Lai and Carlisle Adams
Xuejia Lai and Stafford Tavares
Systematic
Symmetric
Asymmetric
None of the mentioned above
Each ciphertext block gets 'fed back' into the encryption process
Encrypt the next plaintext block
Both A and B
None of the mentioned above
Yes
No
Can't be determined
Data insufficient
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
512 bits
1024 bits
N x 1024bits
N x 512 bits
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
System approach
Cyber safe
Cryptography
None of the mentioned above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
Authentication
Non repudiation
Data Integrity
All of the above
Fixed size
Variable
Integration
All of the mentioned above
Reverse order
Next order
Both A and B
All of the mentioned above
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Masquerade
Modification of message
Denial of service
Traffic analysis
512 bits
1024 bits
2048 bits
None of the above
f function
permutation p
swapping of halves
xor of subkey with function f
asymmetric-key
logical-key
symmetric-key
None of these
Public-key cryptography
Private-key cryptography
Both
None of these
Data Confidentiality
Data Integrity
Authentication
None of the above
UWP
NUS
WUP
QSL