Authentication
Non repudiation
Data Integrity
All of the above
D. All of the above
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
For large block sizes
For fixed block sizes
For small block sizes
None of the above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Yes
No
Can't be determined
Data insufficient
Quantum Solution
Foreseen Solution
Cryptographic Solution
Block Cipher Solution
16 bits
64 bits
32 bits
All of the mentioned above
Confidentiality
Authenticityn
Data integrityn
All of these
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
Set
Block
Rack
All of the mentioned above
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Abstract view
Mathematical function
Both A and B
None of the mentioned above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
RSA
SHA-1
DES
MD5
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
42
93
114
103
Reverse order
Next order
Both A and B
All of the mentioned above
Avalanche effect
Completeness
Both a. and b.
None of the above
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Encrypt
Decrypt
Both A and B
All of the mentioned above
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above