Related Questions
What is the correct answer?
4
A hash function is a _____ that converts a numerical input value into another compressed numerical value.
D. None of the mentioned above
What is the correct answer?
4
Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value?
D. Data retrieval in its original form
What is the correct answer?
4
Which of the following properties are the characteristic properties of a block cipher technique which differs from stream cipher?
What is the correct answer?
4
____ is the message or data that can be readable by the sender.
D. All of the mentioned above
What is the correct answer?
4
Which of the following is not a property of Hash Function?
What is the correct answer?
4
The above steps are performed in each round of which of the following ciphers?
B. Data Encryption Standard (DES)
C. Advance Encryption Standard (AES)
What is the correct answer?
4
The Hash Function takes an input of arbitrary length and converts it into a fixed length output.Which of the following names can we use for denoting the output of the hash function?
What is the correct answer?
4
We are provided the plain text SUN. You need to convert the given plain text into ciphertext under the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the given text if the key is 2?
What is the correct answer?
4
Which of the following is /are offered by the Hash functions?
What is the correct answer?
4
Amongst which of the following is /are good for Hashes,
B. Data integrity / file verification
C. Digital signatures and virus signatures
D. All of the mentioned above
What is the correct answer?
4
Which of the following is the main disadvantage of the ECB (Electronic Code Book)?orWhich of the following is the major drawback of ECB?
A. It requires large block size
B. Padding is done to make the plain text divisible into blocks of fixed size
C. It is prone to cryptanalysis since there is a direct relationship between plain text and cipher text.
What is the correct answer?
4
Digital Signatures authenticates the sender by appending the original message with the ____ digest.
D. None of the mentioned above
What is the correct answer?
4
To encrypt the plaintext, a cryptographic algorithm works in combination with a key...
A. Word, number, or phrase
What is the correct answer?
4
Which of the following cipher techniques include the involvement of matrix operations in their algorithms of encryption and decryption?
What is the correct answer?
4
Conventional cryptography also known as ... encryption.
What is the correct answer?
4
ElGamal encryption system is an asymmetric key encryption algorithm.
A. Public-key cryptography
B. Private-key cryptography
What is the correct answer?
4
In the case of symmetric key encryption, the secret key that both the parties possess can be anything such as a _______.
A. Passcode or a password
D. None of the mentioned above
What is the correct answer?
4
Cipher Feedback Mode is given as feedback to the ____ of encryption with some new specifications.
D. All of the mentioned above
What is the correct answer?
4
Block ciphers accumulate symbols in a message of a ______.
D. All of the mentioned above
What is the correct answer?
4
Which of the following ciphers is a block cipher?
What is the correct answer?
4
Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.
What is the correct answer?
4
What does IDEA stand for in the world of cryptography?orThe IDEA word in the IDEA algorithm is the abbreviation for which of the following?
A. Independent Decryption Environment Analysis
B. International Defense Encryption Area
C. International Data Encryption Algorithm
What is the correct answer?
4
The greatest threat is to public cryptography or asymmetric algorithms used for ____.
A. Digital signatures and
D. None of the mentioned above
What is the correct answer?
4
An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.
A. Randomize the decryption
B. Randomize the encryption
C. Minimize and maximize the randomization
D. None of the mentioned above
What is the correct answer?
4
RSA algorithm is ____ cryptography algorithm.
D. None of the mentioned above
What is the correct answer?
4
Which is the cryptographic protocol that is used to protect an HTTP connection?
A. Resource reservation protocol
What is the correct answer?
4
Which of the following is not a principle of data security?
What is the correct answer?
4
When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?
D. xor of subkey with function f
What is the correct answer?
4
With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.
D. None of the mentioned above
What is the correct answer?
4
Public key cryptography is a ... cryptosystem
C. Symmetric & Asymmetric both