Home
Current Affairs January 2024

What is the correct answer?

4

When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?

A. f function

B. permutation p

C. swapping of halves

D. xor of subkey with function f

Correct Answer :

C. swapping of halves


Mainly, there is no equivalent to swapping of halves in the AES algorithm in cryptography.

Related Questions

What is the correct answer?

4

RSA algorithm is ____ cryptography algorithm.

A. Systematic

B. Symmetric

C. Asymmetric

D. None of the mentioned above

What is the correct answer?

4

What is the output of a cryptographic hash function means?

A. A variable set of bits

B. A fixed set of bits, derived from one-way mathematical operations

C. An output which may be easily discovered by an adversary

D. Outputs of such functions are of no importance

What is the correct answer?

4

Cryptographic hashing provides a barrier to potential _______.

A. Attackers

B. Sender

C. Receiver

D. None of the mentioned above

What is the correct answer?

4

Decryption is a process to unveil the ______.

A. Unsecured data

B. Secured data

C. Insecure

D. None of the mentioned above

What is the correct answer?

4

In Cipher block chaining mode, the current plaintext block is added to the ____.

A. Previous ciphertext block

B. Next ciphertext block

C. Middle ciphertext block

D. None of the mentioned above

What is the correct answer?

4

In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.

A. 5 similar rounds having 2 pair ; every alternate

B. 9 ; the last

C. 8 ; the first and last

D. 10 ; no

What is the correct answer?

4

Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.

A. Quantum adversaries

B. Quantum integration

C. Quantum hash

D. None of the mentioned above

What is the correct answer?

4

ElGamal encryption system is an asymmetric key encryption algorithm.

A. Public-key cryptography

B. Private-key cryptography

C. Both

D. None of these

What is the correct answer?

4

Which of the following is not a principle of data security?

A. Data Confidentiality

B. Data Integrity

C. Authentication

D. None of the above

What is the correct answer?

4

Public key cryptography is a ... cryptosystem

A. Symmetric

B. Asymmetric

C. Symmetric & Asymmetric both

D. None of these

What is the correct answer?

4

What is the full-form of RSA in the RSA encryption technique?

A. Round Security Algorithm

B. Rivest, Shamir, Adleman

C. Robert, Shamir, Addie

D. None of the above

What is the correct answer?

4

Amongst which of the following is /are good for Hashes,

A. Password protection

B. Data integrity / file verification

C. Digital signatures and virus signatures

D. All of the mentioned above

What is the correct answer?

4

Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?

A. It requires large block size

B. Padding is done to make the plain text divisible into blocks of fixed size

C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.

D. None of the above

What is the correct answer?

4

Among the following given options, chose the strongest encryption technique?

A. DES ( Data Encryption Standard)

B. Double DES

C. Triple DES

D. AES (Advance Encryption Standard)

What is the correct answer?

4

Security Goals of Cryptography are

A. Confidentiality

B. Authenticityn

C. Data integrityn

D. All of these

What is the correct answer?

4

The above steps are performed in each round of which of the following ciphers?

A. Rail fence cipher

B. Data Encryption Standard (DES)

C. Advance Encryption Standard (AES)

D. None of the above

What is the correct answer?

4

All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options

A. i.

B. iii.

C. All of the mentioned

D. None of the mentioned

What is the correct answer?

4

International Data Encryption Algorithm (IDEA) was developed by

A. Xuejia Lai and James Massey

B. Xuejia Lai and Bruce Schneier

C. Xuejia Lai and Carlisle Adams

D. Xuejia Lai and Stafford Tavares

What is the correct answer?

4

The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?

A. The input text is divided into two parts: one being left half and another one being right half.

B. Swapping of the left and right halves are performed after each round.

C. The plain text is converted into a matrix form first

D. None of the above

What is the correct answer?

4

What does IDEA stand for in the world of cryptography?orThe IDEA word in the IDEA algorithm is the abbreviation for which of the following?

A. Independent Decryption Environment Analysis

B. International Defense Encryption Area

C. International Data Encryption Algorithm

D. None of the above

What is the correct answer?

4

Cipher block chaining or CBC is an advancement made on _____.

A. Electronic Code Book

B. Decrypted code

C. System engineering

D. All of the mentioned above

What is the correct answer?

4

Encryption algorithms are divided into two categories based on the ______.

A. Output type

B. Input type

C. Process type

D. All of the mentioned above

What is the correct answer?

4

Which two principles of quantum mechanics on which quantum cryptography are dependent?

A. Heisenberg Uncertainty Principle and Photon Polarization Principle.

B. Fundamental Principle and Bohr's Model Principle

C. Momentum Principle and Photons Principle

D. Planck's Principle and Fundamental Principle

What is the correct answer?

4

A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?

A. An integer values

B. A square matrix

C. An array of characters (i.e. a string)

D. All of the above

What is the correct answer?

4

Which of the following ciphers is a block cipher?

A. Caesar cipher

B. Vernam cipher

C. Playfair cipher

D. None of the above

What is the correct answer?

4

Which of the following is /are offered by the Hash functions?

A. Authentication

B. Non repudiation

C. Data Integrity

D. All of the above

What is the correct answer?

4

Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?

A. Avalanche effect

B. Completeness

C. Both a. and b.

D. None of the above

What is the correct answer?

4

With reference to Cipher Feedback (CFB) Mode, amongst which of the following is /are true,

A. Each ciphertext block gets 'fed back' into the encryption process

B. Encrypt the next plaintext block

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

Which of the following is not a property of Hash Function?

A. Pre-Image Resistance

B. Compression

C. Fixed Length Output

D. None of the above

What is the correct answer?

4

Which of the following cannot be chosen as a key in the Caesar cipher?

A. An integer

B. An alphabet (A-Z or a-z)

C. A string

D. None of the above