Related Questions
What is the correct answer?
4
What is the output of the N 1024-bit blocks from the Nth stage in this?
What is the correct answer?
4
_____ and ______ protocol models can be extended to Entangled particles theory.
What is the correct answer?
4
Codes and ciphers are different ways to _____ a message.
D. All of the mentioned above
What is the correct answer?
4
With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.
D. None of the mentioned above
What is the correct answer?
4
Block ciphers accumulate symbols in a message of a ______.
D. All of the mentioned above
What is the correct answer?
4
Which of the following ciphers uses asymmetric key cryptography?
B. Data Encryption Standard (DES)
What is the correct answer?
4
____ is the message or data that can be readable by the sender.
D. All of the mentioned above
What is the correct answer?
4
International Data Encryption Algorithm (IDEA) was developed by
A. Xuejia Lai and James Massey
B. Xuejia Lai and Bruce Schneier
C. Xuejia Lai and Carlisle Adams
D. Xuejia Lai and Stafford Tavares
What is the correct answer?
4
All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options
What is the correct answer?
4
Cipher block chaining or CBC is an advancement made on _____.
D. All of the mentioned above
What is the correct answer?
4
In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.
A. Passcode or a password
D. None of the mentioned above
What is the correct answer?
4
The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?
A. 128 key size: 10 rounds
B. 192 key size: 12 rounds
C. 256 key size: 14 rounds
What is the correct answer?
4
How many elements are used in cryptography tools?
What is the correct answer?
4
_____ and encryption is two separate cryptographic processes.
D. None of the mentioned above
What is the correct answer?
4
What is the output of a cryptographic hash function means?
A. A variable set of bits
B. A fixed set of bits, derived from one-way mathematical operations
C. An output which may be easily discovered by an adversary
D. Outputs of such functions are of no importance
What is the correct answer?
4
Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?
What is the correct answer?
4
For which of the following should EBC (Electronic Code Book) process not be used for encryption?
What is the correct answer?
4
To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
A. Word, number, or phrase
What is the correct answer?
4
Decryption is a process to unveil the ______.
D. None of the mentioned above
What is the correct answer?
4
With reference to Cipher Feedback (CFB) Mode, amongst which of the following is /are true,
A. Each ciphertext block gets 'fed back' into the encryption process
B. Encrypt the next plaintext block
D. None of the mentioned above
What is the correct answer?
4
What is the full-form of RSA in the RSA encryption technique?
A. Round Security Algorithm
B. Rivest, Shamir, Adleman
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol
What is the correct answer?
4
Amongst which of the following is / are true with reference to the rounds in AES
C. Mix Column and Key Addition
D. All of the mentioned above
What is the correct answer?
4
Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
What is the correct answer?
4
Which of the following is a mode of operation for the Block ciphers in cryptography?
A. Electronic Code Book (ECB)
B. Cipher Block Chaining (CBC)
What is the correct answer?
4
The greatest threat is to public cryptography or asymmetric algorithms used for ____.
A. Digital signatures and
D. None of the mentioned above
What is the correct answer?
4
Which of the following are used to create a message digest by the network security protocols?
What is the correct answer?
4
Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.
D. All of the mentioned above
What is the correct answer?
4
You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,
Is the given matrix 'A', a valid key to be used for encryption?
What is the correct answer?
4
The private key in asymmetric key cryptography is kept by
D. All the connected devices to the network