Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?

A. CBC (Cipher Block Chaining)

B. ECB (Electronic Code Book)

C. CFB (Cipher text Feed Back)

D. All of the above

Correct Answer :

C. CFB (Cipher text Feed Back)


CFB is primarily a mode to derive some characteristics of a stream cipher from a block cipher on the cryptography in cryptoanalysis.

Related Questions

What is the correct answer?

4

Block ciphers accumulate symbols in a message of a ______.

A. Fixed size

B. Variable

C. Integration

D. All of the mentioned above

What is the correct answer?

4

When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?

A. f function

B. permutation p

C. swapping of halves

D. xor of subkey with function f

What is the correct answer?

4

Cipher in cryptography is

A. Encrypted message

B. Algorithm for performing encryption and decryption

C. Both algorithm for performing encryption and decryption and encrypted message

D. Decrypted message

What is the correct answer?

4

Which of the following options is not correct according to the definition of the Hash Function?

A. Hash Functions are mathematical functions

B. They compress the input values

C. The hash functions work on arbitrary length input but produces fixed length output.

D. None of the above

What is the correct answer?

4

Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,

A. The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment

B. Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon

C. Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent

D. All of the mentioned above

What is the correct answer?

4

Public key cryptography is a ... cryptosystem

A. Symmetric

B. Asymmetric

C. Symmetric & Asymmetric both

D. None of these

What is the correct answer?

4

Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value?

A. Password Check

B. Data Integrity check

C. Digital Signatures

D. Data retrieval in its original form

What is the correct answer?

4

Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?

A. Masquerade

B. Modification of message

C. Denial of service

D. Traffic analysis

What is the correct answer?

4

All the below-stated processes are performed in the AES (Advanced Encryption Standard) Algorithm. Which of the following process(s) are not performed in the final round of the AES?
a) Substitution bytes
b) Shift rows
c) Mix columns
d) Add round key
Options

A. i.

B. iii.

C. All of the mentioned

D. None of the mentioned

What is the correct answer?

4

Conventional cryptography also known as ... encryption.

A. asymmetric-key

B. logical-key

C. symmetric-key

D. None of these

What is the correct answer?

4

How many elements are used in cryptography tools?

A. 1

B. 4

C. 6

D. 3

What is the correct answer?

4

An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.

A. Randomize the decryption

B. Randomize the encryption

C. Minimize and maximize the randomization

D. None of the mentioned above

What is the correct answer?

4

Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?

A. Avalanche effect

B. Completeness

C. Both a. and b.

D. None of the above

What is the correct answer?

4

Codes and ciphers are different ways to _____ a message.

A. Encrypt

B. Decrypt

C. Both A and B

D. All of the mentioned above

What is the correct answer?

4

The private key in asymmetric key cryptography is kept by

A. Sender

B. Receiver

C. Sender and receiver

D. All the connected devices to the network

What is the correct answer?

4

The greatest threat is to public cryptography or asymmetric algorithms used for ____.

A. Digital signatures and

B. Key exchange

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

A mechanism used to encrypt and decrypt data.

A. Cryptography

B. Algorithm

C. Data flow

D. None of these

What is the correct answer?

4

What is the block size of plain text in SHA- 512 algorithm?

A. 512 bits

B. 1024 bits

C. 2048 bits

D. None of the above

What is the correct answer?

4

Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?

A. Hill Cipher

B. Playfair cipher

C. Both a and b

D. None of the above

What is the correct answer?

4

Encryption algorithms are divided into two categories based on the ______.

A. Output type

B. Input type

C. Process type

D. All of the mentioned above

What is the correct answer?

4

In Cipher block chaining mode, the current plaintext block is added to the ____.

A. Previous ciphertext block

B. Next ciphertext block

C. Middle ciphertext block

D. None of the mentioned above

What is the correct answer?

4

Decryption is a process to unveil the ______.

A. Unsecured data

B. Secured data

C. Insecure

D. None of the mentioned above

What is the correct answer?

4

Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____.

A. Cryptographic system

B. Cryptographic tasks

C. Decryption system

D. None of the mentioned above

What is the correct answer?

4

Which of the following is a mode of operation for the Block ciphers in cryptography?

A. Electronic Code Book (ECB)

B. Cipher Block Chaining (CBC)

C. Counter (CTR) mode

D. All of the above

What is the correct answer?

4

In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.

A. 5 similar rounds having 2 pair ; every alternate

B. 9 ; the last

C. 8 ; the first and last

D. 10 ; no

What is the correct answer?

4

Cryptographic hashing provides a barrier to potential _______.

A. Attackers

B. Sender

C. Receiver

D. None of the mentioned above

What is the correct answer?

4

A hash function is a _____ that converts a numerical input value into another compressed numerical value.

A. Abstract view

B. Mathematical function

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

When a hash function is used to provide message authentication, the hash function value is called to as:

A. Message Field

B. Message Digest

C. Message Score

D. Message Leap

What is the correct answer?

4

Digital Signatures authenticates the sender by appending the original message with the ____ digest.

A. Decrypted message

B. Encrypted message

C. Systematic approach

D. None of the mentioned above

What is the correct answer?

4

In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.

A. Passcode or a password

B. Developed code

C. Network set

D. None of the mentioned above