Related Questions
What is the correct answer?
4
A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?
C. An array of characters (i.e. a string)
What is the correct answer?
4
Conventional cryptography also known as ... encryption.
What is the correct answer?
4
An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.
A. Randomize the decryption
B. Randomize the encryption
C. Minimize and maximize the randomization
D. None of the mentioned above
What is the correct answer?
4
Which of the following is not a principle of data security?
What is the correct answer?
4
Amongst which of the following is/ are showing the goodness of electronic code book,
A. Parallel encryption of blocks of bits is possible
B. It is a faster way of encryption.
C. Simple way of the block cipher.
D. All of the mentioned above
What is the correct answer?
4
All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options
What is the correct answer?
4
Hash functions are used in ___ and have variable levels of complexity and difficulty.
D. None of the mentioned above
What is the correct answer?
4
Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,
A. The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
B. Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
C. Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
D. All of the mentioned above
What is the correct answer?
4
A cryptographic hash function is an equation used to verify the ____ of data.
D. None of the mentioned above
What is the correct answer?
4
_____ and ______ protocol models can be extended to Entangled particles theory.
What is the correct answer?
4
Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?
B. Modification of message
What is the correct answer?
4
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?
What is the correct answer?
4
Cipher in cryptography is
B. Algorithm for performing encryption and decryption
C. Both algorithm for performing encryption and decryption and encrypted message
What is the correct answer?
4
Security Goals of Cryptography are
What is the correct answer?
4
Which of the following options is not correct according to the definition of the Hash Function?
A. Hash Functions are mathematical functions
B. They compress the input values
C. The hash functions work on arbitrary length input but produces fixed length output.
What is the correct answer?
4
Which of the following are used to create a message digest by the network security protocols?
What is the correct answer?
4
What is the block size of plain text in SHA- 512 algorithm?
What is the correct answer?
4
Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?
C. Cryptographic Solution
What is the correct answer?
4
To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
A. Word, number, or phrase
What is the correct answer?
4
The private key in asymmetric key cryptography is kept by
D. All the connected devices to the network
What is the correct answer?
4
Cryptographic hashing provides a barrier to potential _______.
D. None of the mentioned above
What is the correct answer?
4
How many elements are used in cryptography tools?
What is the correct answer?
4
Digital Signatures authenticates the sender by appending the original message with the ____ digest.
D. None of the mentioned above
What is the correct answer?
4
For which of the following should EBC (Electronic Code Book) process not be used for encryption?
What is the correct answer?
4
The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?
A. 128 key size: 10 rounds
B. 192 key size: 12 rounds
C. 256 key size: 14 rounds
What is the correct answer?
4
Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?
A. It requires large block size
B. Padding is done to make the plain text divisible into blocks of fixed size
C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
What is the correct answer?
4
Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
What is the correct answer?
4
Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.
D. None of the mentioned above
What is the correct answer?
4
Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.
D. All of the mentioned above
What is the correct answer?
4
In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.
A. Passcode or a password
D. None of the mentioned above