Data Confidentiality
Data Integrity
Authentication
None of the above
D. None of the above
Reverse order
Next order
Both A and B
All of the mentioned above
Fixed size
Variable
Integration
All of the mentioned above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
asymmetric-key
logical-key
symmetric-key
None of these
Hashing
Decryption
Processing
None of the mentioned above
1024
512
256
1248
Hash value
Hash Code
Message Digest
All of the above
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
Next block
Previous block
Middle block
All of the mentioned above
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
An integer
An alphabet (A-Z or a-z)
A string
None of the above
128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
Abstract view
Mathematical function
Both A and B
None of the mentioned above
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Edited
Main Text
Plain text
All of the mentioned above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
f function
permutation p
swapping of halves
xor of subkey with function f
Systematic
Symmetric
Asymmetric
None of the mentioned above
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above