CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
C. CFB (Cipher text Feed Back)
Fixed size
Variable
Integration
All of the mentioned above
f function
permutation p
swapping of halves
xor of subkey with function f
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
Masquerade
Modification of message
Denial of service
Traffic analysis
i.
iii.
All of the mentioned
None of the mentioned
asymmetric-key
logical-key
symmetric-key
None of these
1
4
6
3
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
Avalanche effect
Completeness
Both a. and b.
None of the above
Encrypt
Decrypt
Both A and B
All of the mentioned above
Sender
Receiver
Sender and receiver
All the connected devices to the network
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Cryptography
Algorithm
Data flow
None of these
512 bits
1024 bits
2048 bits
None of the above
Hill Cipher
Playfair cipher
Both a and b
None of the above
Output type
Input type
Process type
All of the mentioned above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
Unsecured data
Secured data
Insecure
None of the mentioned above
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
Attackers
Sender
Receiver
None of the mentioned above
Abstract view
Mathematical function
Both A and B
None of the mentioned above
Message Field
Message Digest
Message Score
Message Leap
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
Passcode or a password
Developed code
Network set
None of the mentioned above