Related Questions
What is the correct answer?
4
Which of the following modes of operation in DES is used for operating?
A. Cipher Feedback Mode (CFB)
B. Cipher Block chaining (CBC)
C. Electronic code book (ECB)
D. Output Feedback Modes (OFB)
What is the correct answer?
4
International Data Encryption Algorithm (IDEA) was developed by
A. Xuejia Lai and James Massey
B. Xuejia Lai and Bruce Schneier
C. Xuejia Lai and Carlisle Adams
D. Xuejia Lai and Stafford Tavares
What is the correct answer?
4
The greatest threat is to public cryptography or asymmetric algorithms used for ____.
A. Digital signatures and
D. None of the mentioned above
What is the correct answer?
4
The process of decryption of an AES ciphertext is similar to the encryption process in the ______.
D. All of the mentioned above
What is the correct answer?
4
What does IDEA stand for in the world of cryptography?orThe IDEA word in the IDEA algorithm is the abbreviation for which of the following?
A. Independent Decryption Environment Analysis
B. International Defense Encryption Area
C. International Data Encryption Algorithm
What is the correct answer?
4
What is the full-form of RSA in the RSA encryption technique?
A. Round Security Algorithm
B. Rivest, Shamir, Adleman
What is the correct answer?
4
Which one of the following algorithms is not used in asymmetric-key cryptography?
B. Electronic code book algorithm
C. Diffie-Hellman algorithm
What is the correct answer?
4
To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
A. Word, number, or phrase
What is the correct answer?
4
Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.
D. All of the mentioned above
What is the correct answer?
4
What is the block size of plain text in SHA- 512 algorithm?
What is the correct answer?
4
We are provided the plain text SUN. You need to convert the given plain text into ciphertext under the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the given text if the key is 2?
What is the correct answer?
4
The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?
A. The input text is divided into two parts: one being left half and another one being right half.
B. Swapping of the left and right halves are performed after each round.
C. The plain text is converted into a matrix form first
What is the correct answer?
4
Decryption is a process to unveil the ______.
D. None of the mentioned above
What is the correct answer?
4
Codes and ciphers are different ways to _____ a message.
D. All of the mentioned above
What is the correct answer?
4
Which of the following options is not correct according to the definition of the Hash Function?
A. Hash Functions are mathematical functions
B. They compress the input values
C. The hash functions work on arbitrary length input but produces fixed length output.
What is the correct answer?
4
Which possible Attacks in Quantum Cryptography can take place?
A. Possible Attacks in Quantum Cryptography and Birthday Attack
B. Birthday attack and Boomerang attack
C. Brute force attack and Faked-State-Attack
D. Possible Attacks in Quantum Cryptography and Faked-State Attack
What is the correct answer?
4
With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.
D. None of the mentioned above
What is the correct answer?
4
The private key in asymmetric key cryptography is kept by
D. All the connected devices to the network
What is the correct answer?
4
Public key cryptography is a ... cryptosystem
C. Symmetric & Asymmetric both
What is the correct answer?
4
In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.
A. 5 similar rounds having 2 pair ; every alternate
C. 8 ; the first and last
What is the correct answer?
4
What is the output of a cryptographic hash function means?
A. A variable set of bits
B. A fixed set of bits, derived from one-way mathematical operations
C. An output which may be easily discovered by an adversary
D. Outputs of such functions are of no importance
What is the correct answer?
4
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?
What is the correct answer?
4
Amongst which of the following is/ are showing the goodness of electronic code book,
A. Parallel encryption of blocks of bits is possible
B. It is a faster way of encryption.
C. Simple way of the block cipher.
D. All of the mentioned above
What is the correct answer?
4
_____ and ______ protocol models can be extended to Entangled particles theory.
What is the correct answer?
4
Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.
D. None of the mentioned above
What is the correct answer?
4
Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.
D. All of the mentioned above
What is the correct answer?
4
A mechanism used to encrypt and decrypt data.
What is the correct answer?
4
The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?
A. 128 key size: 10 rounds
B. 192 key size: 12 rounds
C. 256 key size: 14 rounds
What is the correct answer?
4
The Hash Function takes an input of arbitrary length and converts it into a fixed length output.Which of the following names can we use for denoting the output of the hash function?
What is the correct answer?
4
You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,
Is the given matrix 'A', a valid key to be used for encryption?