Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following is not a property of Hash Function?

A. Pre-Image Resistance

B. Compression

C. Fixed Length Output

D. None of the above

Correct Answer :

D. None of the above


All the first three options are the properties of the Hash function. None of the mentioned characteristic fall apart form them. Therefore, the correct answer is none of the above.

Related Questions

What is the correct answer?

4

A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?

A. An integer values

B. A square matrix

C. An array of characters (i.e. a string)

D. All of the above

What is the correct answer?

4

Block ciphers accumulate symbols in a message of a ______.

A. Fixed size

B. Variable

C. Integration

D. All of the mentioned above

What is the correct answer?

4

The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?

A. 128 key size: 10 rounds

B. 192 key size: 12 rounds

C. 256 key size: 14 rounds

D. All of the above

What is the correct answer?

4

Cipher block chaining or CBC is an advancement made on _____.

A. Electronic Code Book

B. Decrypted code

C. System engineering

D. All of the mentioned above

What is the correct answer?

4

Which of the following is not a type of symmetric-key cryptography technique?

A. Caesar cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman cipher

D. Playfair cipher

What is the correct answer?

4

Which of the following is not a property of Hash Function?

A. Pre-Image Resistance

B. Compression

C. Fixed Length Output

D. None of the above

What is the correct answer?

4

Amongst which of the following is/ are showing the goodness of electronic code book,

A. Parallel encryption of blocks of bits is possible

B. It is a faster way of encryption.

C. Simple way of the block cipher.

D. All of the mentioned above

What is the correct answer?

4

When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?

A. f function

B. permutation p

C. swapping of halves

D. xor of subkey with function f

What is the correct answer?

4

Encryption algorithms are divided into two categories based on the ______.

A. Output type

B. Input type

C. Process type

D. All of the mentioned above

What is the correct answer?

4

In Cipher block chaining mode, the current plaintext block is added to the ____.

A. Previous ciphertext block

B. Next ciphertext block

C. Middle ciphertext block

D. None of the mentioned above

What is the correct answer?

4

Which one of the following algorithms is not used in asymmetric-key cryptography?

A. DSA algorithm

B. Electronic code book algorithm

C. Diffie-Hellman algorithm

D. RSA algorithm

What is the correct answer?

4

Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:

A. 42

B. 93

C. 114

D. 103

What is the correct answer?

4

The above steps are performed in each round of which of the following ciphers?

A. Rail fence cipher

B. Data Encryption Standard (DES)

C. Advance Encryption Standard (AES)

D. None of the above

What is the correct answer?

4

_____ and encryption is two separate cryptographic processes.

A. Hashing

B. Decryption

C. Processing

D. None of the mentioned above

What is the correct answer?

4

Amongst which of the following is / are true with reference to the rounds in AES

A. Byte Substitution

B. Shift Row

C. Mix Column and Key Addition

D. All of the mentioned above

What is the correct answer?

4

Codes and ciphers are different ways to _____ a message.

A. Encrypt

B. Decrypt

C. Both A and B

D. All of the mentioned above

What is the correct answer?

4

Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?

A. Avalanche effect

B. Completeness

C. Both a. and b.

D. None of the above

What is the correct answer?

4

Which of the following ciphers uses asymmetric key cryptography?

A. Rail Fence Cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman Cipher

D. None of the above

What is the correct answer?

4

Cryptographic hashing provides a barrier to potential _______.

A. Attackers

B. Sender

C. Receiver

D. None of the mentioned above

What is the correct answer?

4

Which of the following is /are offered by the Hash functions?

A. Authentication

B. Non repudiation

C. Data Integrity

D. All of the above

What is the correct answer?

4

Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?

A. It requires large block size

B. Padding is done to make the plain text divisible into blocks of fixed size

C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.

D. None of the above

What is the correct answer?

4

What is the output of the N 1024-bit blocks from the Nth stage in this?

A. 512 bits

B. 1024 bits

C. N x 1024bits

D. N x 512 bits

What is the correct answer?

4

With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.

A. Different

B. Same

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?

A. 64 sub- keys

B. 48 sub- keys

C. 52 sub- keys

D. Only one key and no subkeys

What is the correct answer?

4

The greatest threat is to public cryptography or asymmetric algorithms used for ____.

A. Digital signatures and

B. Key exchange

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

Which of the following options is not correct according to the definition of the Hash Function?

A. Hash Functions are mathematical functions

B. They compress the input values

C. The hash functions work on arbitrary length input but produces fixed length output.

D. None of the above

What is the correct answer?

4

Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?

A. CBC is a mode of operation for stream ciphers.

B. Initialization vector (IV) is used in CBC in the initial phase.

C. It has better resistive nature towards cryptanalysis than ECB

D. None of the above

What is the correct answer?

4

International Data Encryption Algorithm (IDEA) was developed by

A. Xuejia Lai and James Massey

B. Xuejia Lai and Bruce Schneier

C. Xuejia Lai and Carlisle Adams

D. Xuejia Lai and Stafford Tavares

What is the correct answer?

4

A cryptographic hash function is an equation used to verify the ____ of data.

A. Variety

B. Validity

C. Veracity

D. None of the mentioned above

What is the correct answer?

4

RSA algorithm is ____ cryptography algorithm.

A. Systematic

B. Symmetric

C. Asymmetric

D. None of the mentioned above