Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
D. Data retrieval in its original form
Message Field
Message Digest
Message Score
Message Leap
512 bits
1024 bits
2048 bits
None of the above
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Hash value
Hash Code
Message Digest
All of the above
Electronic Code Book (ECB)
Cipher Block Chaining (CBC)
Counter (CTR) mode
All of the above
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
An integer
An alphabet (A-Z or a-z)
A string
None of the above
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Quantum Solution
Foreseen Solution
Cryptographic Solution
Block Cipher Solution
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
Output type
Input type
Process type
All of the mentioned above
Data Confidentiality
Data Integrity
Authentication
None of the above
i.
iii.
All of the mentioned
None of the mentioned
Edited
Main Text
Plain text
All of the mentioned above
Next block
Previous block
Middle block
All of the mentioned above
Digital signatures and
Key exchange
Both A and B
None of the mentioned above
Passcode or a password
Developed code
Network set
None of the mentioned above
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
Different
Same
Both A and B
None of the mentioned above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
1024
512
256
1248
Avalanche effect
Completeness
Both a. and b.
None of the above
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
System approach
Cyber safe
Cryptography
None of the mentioned above
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above