Home
Current Affairs January 2024

What is the correct answer?

4

With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.

A. Different

B. Same

C. Both A and B

D. None of the mentioned above

Correct Answer :

B. Same


When using symmetric key techniques, the same key is utilized for both the encryption and decryption of the information being transmitted. Asymmetric key algorithms, which encrypt and decrypt data using public and private keys, are used to protect sensitive information.

Related Questions

What is the correct answer?

4

When do we compare the AES with DES, which of the following functions from DES does not have an equivalent AES function in cryptography?

A. f function

B. permutation p

C. swapping of halves

D. xor of subkey with function f

What is the correct answer?

4

The private key in asymmetric key cryptography is kept by

A. Sender

B. Receiver

C. Sender and receiver

D. All the connected devices to the network

What is the correct answer?

4

Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value?

A. Password Check

B. Data Integrity check

C. Digital Signatures

D. Data retrieval in its original form

What is the correct answer?

4

Block ciphers accumulate symbols in a message of a ______.

A. Fixed size

B. Variable

C. Integration

D. All of the mentioned above

What is the correct answer?

4

What is the output of the N 1024-bit blocks from the Nth stage in this?

A. 512 bits

B. 1024 bits

C. N x 1024bits

D. N x 512 bits

What is the correct answer?

4

Basically, in SHA-512, the message is divided into blocks of size ___ bits for the hash computation.

A. 1024

B. 512

C. 256

D. 1248

What is the correct answer?

4

Which is the cryptographic protocol that is used to protect an HTTP connection?

A. Resource reservation protocol

B. SCTP

C. TLS

D. ECN

What is the correct answer?

4

An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.

A. Randomize the decryption

B. Randomize the encryption

C. Minimize and maximize the randomization

D. None of the mentioned above

What is the correct answer?

4

_____ ciphers encrypt uniformly sized blocks of data.

A. Set

B. Block

C. Rack

D. All of the mentioned above

What is the correct answer?

4

Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____.

A. Cryptographic system

B. Cryptographic tasks

C. Decryption system

D. None of the mentioned above

What is the correct answer?

4

Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?

A. CBC (Cipher Block Chaining)

B. ECB (Electronic Code Book)

C. CFB (Cipher text Feed Back)

D. All of the above

What is the correct answer?

4

International Data Encryption Algorithm (IDEA) was developed by

A. Xuejia Lai and James Massey

B. Xuejia Lai and Bruce Schneier

C. Xuejia Lai and Carlisle Adams

D. Xuejia Lai and Stafford Tavares

What is the correct answer?

4

Codes and ciphers are different ways to _____ a message.

A. Encrypt

B. Decrypt

C. Both A and B

D. All of the mentioned above

What is the correct answer?

4

We are provided the plain text SUN. You need to convert the given plain text into ciphertext under the Ceasar cipher encryption technique. Which of the following options is the correct ciphertext for the given text if the key is 2?

A. UWP

B. NUS

C. WUP

D. QSL

What is the correct answer?

4

The Hash Function takes an input of arbitrary length and converts it into a fixed length output.Which of the following names can we use for denoting the output of the hash function?

A. Hash value

B. Hash Code

C. Message Digest

D. All of the above

What is the correct answer?

4

Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?

A. Masquerade

B. Modification of message

C. Denial of service

D. Traffic analysis

What is the correct answer?

4

With reference to Cipher Feedback (CFB) Mode, amongst which of the following is /are true,

A. Each ciphertext block gets 'fed back' into the encryption process

B. Encrypt the next plaintext block

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

Decryption is a process to unveil the ______.

A. Unsecured data

B. Secured data

C. Insecure

D. None of the mentioned above

What is the correct answer?

4

_____ and encryption is two separate cryptographic processes.

A. Hashing

B. Decryption

C. Processing

D. None of the mentioned above

What is the correct answer?

4

In the AES-128 algorithm there are mainly __________ similar rounds and _________ round is different from other round.

A. 5 similar rounds having 2 pair ; every alternate

B. 9 ; the last

C. 8 ; the first and last

D. 10 ; no

What is the correct answer?

4

To encrypt the plaintext, a cryptographic algorithm works in combination with a key...

A. Word, number, or phrase

B. Special Symbols

C. Function Keys

D. All of these

What is the correct answer?

4

In Cipher block chaining mode, the current plaintext block is added to the ____.

A. Previous ciphertext block

B. Next ciphertext block

C. Middle ciphertext block

D. None of the mentioned above

What is the correct answer?

4

Which one of the following algorithms is not used in asymmetric-key cryptography?

A. DSA algorithm

B. Electronic code book algorithm

C. Diffie-Hellman algorithm

D. RSA algorithm

What is the correct answer?

4

You are supposed to use hill cipher for encryption technique. You are provided with the following matrix,
Is the given matrix 'A', a valid key to be used for encryption?

A. Yes

B. No

C. Can't be determined

D. Data insufficient

What is the correct answer?

4

The DES (Data Encryption Standard) cipher follows the fiestal structure. Which of the following properties are not shown by the fiestal structure?

A. The input text is divided into two parts: one being left half and another one being right half.

B. Swapping of the left and right halves are performed after each round.

C. The plain text is converted into a matrix form first

D. None of the above

What is the correct answer?

4

Encryption algorithms are divided into two categories based on the ______.

A. Output type

B. Input type

C. Process type

D. All of the mentioned above

What is the correct answer?

4

With symmetric key algorithms, the ____ key is used for the encryption and decryption of data.

A. Different

B. Same

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

What does IDEA stand for in the world of cryptography?orThe IDEA word in the IDEA algorithm is the abbreviation for which of the following?

A. Independent Decryption Environment Analysis

B. International Defense Encryption Area

C. International Data Encryption Algorithm

D. None of the above

What is the correct answer?

4

____ is the message or data that can be readable by the sender.

A. Edited

B. Main Text

C. Plain text

D. All of the mentioned above

What is the correct answer?

4

Amongst which of the following is/ are showing the goodness of electronic code book,

A. Parallel encryption of blocks of bits is possible

B. It is a faster way of encryption.

C. Simple way of the block cipher.

D. All of the mentioned above