Avalanche effect
Completeness
Both a. and b.
None of the above
C. Both a. and b.
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Hashing
Decryption
Processing
None of the mentioned above
Quantum Solution
Foreseen Solution
Cryptographic Solution
Block Cipher Solution
Authentication
Non repudiation
Data Integrity
All of the above
RSA
SHA-1
DES
MD5
Sender
Receiver
Sender and receiver
All the connected devices to the network
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
Reverse order
Next order
Both A and B
All of the mentioned above
512 bits
1024 bits
2048 bits
None of the above
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Abstract view
Mathematical function
Both A and B
None of the mentioned above
Yes
No
Can't be determined
Data insufficient
Hill Cipher
Playfair cipher
Both a and b
None of the above
Message Field
Message Digest
Message Score
Message Leap
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
Output type
Input type
Process type
All of the mentioned above
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Unsecured data
Secured data
Insecure
None of the mentioned above
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Fixed size
Variable
Integration
All of the mentioned above
16 bits
64 bits
32 bits
All of the mentioned above
Cryptography
Algorithm
Data flow
None of these
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above