Related Questions
What is the correct answer?
4
We are provided the plain text SUN. You need to convert the given plain text into ciphertext under the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the given text if the key is 2?
What is the correct answer?
4
What is the full-form of RSA in the RSA encryption technique?
A. Round Security Algorithm
B. Rivest, Shamir, Adleman
What is the correct answer?
4
____ is the message or data that can be readable by the sender.
D. All of the mentioned above
What is the correct answer?
4
Which of the following modes of operation in DES is used for operating?
A. Cipher Feedback Mode (CFB)
B. Cipher Block chaining (CBC)
C. Electronic code book (ECB)
D. Output Feedback Modes (OFB)
What is the correct answer?
4
Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:
What is the correct answer?
4
In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.
A. 5 similar rounds having 2 pair ; every alternate
C. 8 ; the first and last
What is the correct answer?
4
Which of the following is /are offered by the Hash functions?
What is the correct answer?
4
The Hash Function takes an input of arbitrary length and converts it into a fixed length output.Which of the following names can we use for denoting the output of the hash function?
What is the correct answer?
4
Encryption algorithms are divided into two categories based on the ______.
D. All of the mentioned above
What is the correct answer?
4
International Data Encryption Algorithm (IDEA) was developed by
A. Xuejia Lai and James Massey
B. Xuejia Lai and Bruce Schneier
C. Xuejia Lai and Carlisle Adams
D. Xuejia Lai and Stafford Tavares
What is the correct answer?
4
Which of the following cannot be chosen as a key in the Caesar cipher?
B. An alphabet (A-Z or a-z)
What is the correct answer?
4
Hash functions are used in ___ and have variable levels of complexity and difficulty.
D. None of the mentioned above
What is the correct answer?
4
Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.
D. All of the mentioned above
What is the correct answer?
4
Decryption is a process to unveil the ______.
D. None of the mentioned above
What is the correct answer?
4
Which of the following is not a type of symmetric-key cryptography technique?
B. Data Encryption Standard (DES)
What is the correct answer?
4
How many sub-keys in the total are used by the IDEA for encrypting the plain text into ciphertext?
D. Only one key and no subkeys
What is the correct answer?
4
Which possible Attacks in Quantum Cryptography can take place?
A. Possible Attacks in Quantum Cryptography and Birthday Attack
B. Birthday attack and Boomerang attack
C. Brute force attack and Faked-State-Attack
D. Possible Attacks in Quantum Cryptography and Faked-State Attack
What is the correct answer?
4
Amongst which of the following is/ are showing the goodness of electronic code book,
A. Parallel encryption of blocks of bits is possible
B. It is a faster way of encryption.
C. Simple way of the block cipher.
D. All of the mentioned above
What is the correct answer?
4
Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
What is the correct answer?
4
Among the following given options, chose the strongest encryption technique?
A. DES ( Data Encryption Standard)
D. AES (Advance Encryption Standard)
What is the correct answer?
4
Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value?
D. Data retrieval in its original form
What is the correct answer?
4
The greatest threat is to public cryptography or asymmetric algorithms used for ____.
A. Digital signatures and
D. None of the mentioned above
What is the correct answer?
4
What is the output of a cryptographic hash function means?
A. A variable set of bits
B. A fixed set of bits, derived from one-way mathematical operations
C. An output which may be easily discovered by an adversary
D. Outputs of such functions are of no importance
What is the correct answer?
4
The process of decryption of an AES ciphertext is similar to the encryption process in the ______.
D. All of the mentioned above
What is the correct answer?
4
Conventional cryptography also known as ... encryption.
What is the correct answer?
4
Which of the following is not a principle of data security?
What is the correct answer?
4
When a hash function is used to provide message authentication, the hash function value is called to as:
What is the correct answer?
4
Digital Signatures authenticates the sender by appending the original message with the ____ digest.
D. None of the mentioned above
What is the correct answer?
4
Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?
C. Cryptographic Solution
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol