Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
D. Possible Attacks in Quantum Cryptography and Faked-State Attack
An integer values
A square matrix
An array of characters (i.e. a string)
All of the above
Caesar cipher
Data Encryption Standard (DES)
Diffie Hellman cipher
Playfair cipher
Round Security Algorithm
Rivest, Shamir, Adleman
Robert, Shamir, Addie
None of the above
Edited
Main Text
Plain text
All of the mentioned above
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
Authentication
Non repudiation
Data Integrity
All of the above
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack
Confidentiality
Authenticityn
Data integrityn
All of these
Word, number, or phrase
Special Symbols
Function Keys
All of these
Masquerade
Modification of message
Denial of service
Traffic analysis
Password Check
Data Integrity check
Digital Signatures
Data retrieval in its original form
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
Sender
Receiver
Sender and receiver
All the connected devices to the network
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
Hash value
Map value
Both A and B
None of the mentioned above
Variety
Validity
Veracity
None of the mentioned above
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
asymmetric-key
logical-key
symmetric-key
None of these
16 bits
64 bits
32 bits
All of the mentioned above
Hashing
Decryption
Processing
None of the mentioned above
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
Data Confidentiality
Data Integrity
Authentication
None of the above
Systematic
Symmetric
Asymmetric
None of the mentioned above
System approach
Cyber safe
Cryptography
None of the mentioned above
128 key size: 10 rounds
192 key size: 12 rounds
256 key size: 14 rounds
All of the above
CBC is a mode of operation for stream ciphers.
Initialization vector (IV) is used in CBC in the initial phase.
It has better resistive nature towards cryptanalysis than ECB
None of the above
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Decrypted message
Encrypted message
Systematic approach
None of the mentioned above
Caesar cipher
Vernam cipher
Playfair cipher
None of the above