Heisenberg Uncertainty Principle and Photon Polarization Principle.
Fundamental Principle and Bohr's Model Principle
Momentum Principle and Photons Principle
Planck's Principle and Fundamental Principle
A. Heisenberg Uncertainty Principle and Photon Polarization Principle.
Data Confidentiality
Data Integrity
Authentication
None of the above
DES ( Data Encryption Standard)
Double DES
Triple DES
AES (Advance Encryption Standard)
Next block
Previous block
Middle block
All of the mentioned above
42
93
114
103
Quantum adversaries
Quantum integration
Quantum hash
None of the mentioned above
Cryptographic system
Cryptographic tasks
Decryption system
None of the mentioned above
CBC (Cipher Block Chaining)
ECB (Electronic Code Book)
CFB (Cipher text Feed Back)
All of the above
Previous ciphertext block
Next ciphertext block
Middle ciphertext block
None of the mentioned above
512 bits
1024 bits
2048 bits
None of the above
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
A variable set of bits
A fixed set of bits, derived from one-way mathematical operations
An output which may be easily discovered by an adversary
Outputs of such functions are of no importance
An integer values
A square matrix
An array of characters (i.e. a string)
All of the above
512 bits
1024 bits
N x 1024bits
N x 512 bits
Password protection
Data integrity / file verification
Digital signatures and virus signatures
All of the mentioned above
Cipher Feedback Mode (CFB)
Cipher Block chaining (CBC)
Electronic code book (ECB)
Output Feedback Modes (OFB)
RSA
SHA-1
DES
MD5
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
Output type
Input type
Process type
All of the mentioned above
Abstract view
Mathematical function
Both A and B
None of the mentioned above
Yes
No
Can't be determined
Data insufficient
Authentication
Non repudiation
Data Integrity
All of the above
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
It requires large block size
Padding is done to make the plain text divisible into blocks of fixed size
It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
None of the above
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
Confidentiality
Authenticityn
Data integrityn
All of these
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
Reverse order
Next order
Both A and B
All of the mentioned above
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
Possible Attacks in Quantum Cryptography and Birthday Attack
Birthday attack and Boomerang attack
Brute force attack and Faked-State-Attack
Possible Attacks in Quantum Cryptography and Faked-State Attack