Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
D. None of the above
Sender
Receiver
Sender and receiver
All the connected devices to the network
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
Word, number, or phrase
Special Symbols
Function Keys
All of these
Hash value
Map value
Both A and B
None of the mentioned above
Public-key cryptography
Private-key cryptography
Both
None of these
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Symmetric
Asymmetric
Symmetric & Asymmetric both
None of these
Variety
Validity
Veracity
None of the mentioned above
Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
Quantum Solution
Foreseen Solution
Cryptographic Solution
Block Cipher Solution
Fixed size
Variable
Integration
All of the mentioned above
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Systematic
Symmetric
Asymmetric
None of the mentioned above
f function
permutation p
swapping of halves
xor of subkey with function f
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Message Field
Message Digest
Message Score
Message Leap
asymmetric-key
logical-key
symmetric-key
None of these
RSA
SHA-1
DES
MD5
Avalanche effect
Completeness
Both a. and b.
None of the above
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Edited
Main Text
Plain text
All of the mentioned above
Next block
Previous block
Middle block
All of the mentioned above