Masquerade
Modification of message
Denial of service
Traffic analysis
D. Traffic analysis
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
SARG04 and HTTP
FTP and SSP
SARG04 and SSP
HTTP and FTP
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
Rail Fence Cipher
Data Encryption Standard (DES)
Diffie Hellman Cipher
None of the above
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
Abstract view
Mathematical function
Both A and B
None of the mentioned above
64 sub- keys
48 sub- keys
52 sub- keys
Only one key and no subkeys
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
Variety
Validity
Veracity
None of the mentioned above
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Attackers
Sender
Receiver
None of the mentioned above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
Fixed size
Variable
Integration
All of the mentioned above
Masquerade
Modification of message
Denial of service
Traffic analysis
512 bits
1024 bits
N x 1024bits
N x 512 bits
System approach
Cyber safe
Cryptography
None of the mentioned above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
512 bits
1024 bits
2048 bits
None of the above
Message Field
Message Digest
Message Score
Message Leap
Digital signatures and
Key exchange
Both A and B
None of the mentioned above