f function
permutation p
swapping of halves
xor of subkey with function f
C. swapping of halves
Systematic
Symmetric
Asymmetric
None of the mentioned above
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
Attackers
Sender
Receiver
None of the mentioned above
Unsecured data
Secured data
Insecure
None of the mentioned above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
Public-key cryptography
Private-key cryptography
Both
None of these
Data Confidentiality
Data Integrity
Authentication
None of the above
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
Confidentiality
Authenticityn
Data integrityn
All of these
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
i.
iii.
All of the mentioned
None of the mentioned
Xuejia Lai and James Massey
Xuejia Lai and Bruce Schneier
Xuejia Lai and Carlisle Adams
Xuejia Lai and Stafford Tavares
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
Output type
Input type
Process type
All of the mentioned above
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
An integer values
A square matrix
An array of characters (i.e. a string)
All of the above
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
Authentication
Non repudiation
Data Integrity
All of the above
Avalanche effect
Completeness
Both a. and b.
None of the above
Each ciphertext block gets 'fed back' into the encryption process
Encrypt the next plaintext block
Both A and B
None of the mentioned above
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
An integer
An alphabet (A-Z or a-z)
A string
None of the above