Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
B. Trying every possible key to decrypt the message.
512 bits
1024 bits
N x 1024bits
N x 512 bits
Variety
Validity
Veracity
None of the mentioned above
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
Output type
Input type
Process type
All of the mentioned above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Different
Same
Both A and B
None of the mentioned above
Next block
Previous block
Middle block
All of the mentioned above
RSA
SHA-1
DES
MD5
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
System approach
Cyber safe
Cryptography
None of the mentioned above
1024
512
256
1248
Authentication
Non repudiation
Data Integrity
All of the above
Xuejia Lai and James Massey
Xuejia Lai and Bruce Schneier
Xuejia Lai and Carlisle Adams
Xuejia Lai and Stafford Tavares
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
f function
permutation p
swapping of halves
xor of subkey with function f
Fixed size
Variable
Integration
All of the mentioned above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
42
93
114
103
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
1
4
6
3
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
Yes
No
Can't be determined
Data insufficient
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Hill Cipher
Playfair cipher
Both a and b
None of the above