Resource reservation protocol
SCTP
TLS
ECN
C. TLS
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
Authentication
Non repudiation
Data Integrity
All of the above
128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
An integer values
A square matrix
An array of characters (i.e. a string)
All of the above
Hill Cipher
Playfair cipher
Both a and b
None of the above
1024
512
256
1248
Encrypt
Decrypt
Both A and B
All of the mentioned above
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Output type
Input type
Process type
All of the mentioned above
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
Systematic
Symmetric
Asymmetric
None of the mentioned above
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
f function
permutation p
swapping of halves
xor of subkey with function f
512 bits
1024 bits
2048 bits
None of the above
Set
Block
Rack
All of the mentioned above
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Each ciphertext block gets 'fed back' into the encryption process
Encrypt the next plaintext block
Both A and B
None of the mentioned above
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
Abstract view
Mathematical function
Both A and B
None of the mentioned above
System approach
Cyber safe
Cryptography
None of the mentioned above