Pre-Image Resistance
Compression
Fixed Length Output
None of the above
D. None of the above
An integer values
A square matrix
An array of characters (i.e. a string)
All of the above
Fixed size
Variable
Integration
All of the mentioned above
128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Pre-Image Resistance
Compression
Fixed Length Output
None of the above
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
f function
permutation p
swapping of halves
xor of subkey with function f
Output type
Input type
Process type
All of the mentioned above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
42
93
114
103
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
Hashing
Decryption
Processing
None of the mentioned above
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
Encrypt
Decrypt
Both A and B
All of the mentioned above
Avalanche effect
Completeness
Both a. and b.
None of the above
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Attackers
Sender
Receiver
None of the mentioned above
Authentication
Non repudiation
Data Integrity
All of the above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
512 bits
1024 bits
N x 1024bits
N x 512 bits
Different
Same
Both A and B
None of the mentioned above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Xuejia Lai and James Massey
Xuejia Lai and Bruce Schneier
Xuejia Lai and Carlisle Adams
Xuejia Lai and Stafford Tavares
Variety
Validity
Veracity
None of the mentioned above
Systematic
Symmetric
Asymmetric
None of the mentioned above