Yes
No
Can't be determined
Data insufficient
B. No
Electronic Code Book
Decrypted code
System engineering
All of the mentioned above
DSA algorithm
Electronic code book algorithm
Diffie-Hellman algorithm
RSA algorithm
i.
iii.
All of the mentioned
None of the mentioned
Cryptography
Algorithm
Data flow
None of these
An integer
An alphabet (A-Z or a-z)
A string
None of the above
Public-key cryptography
Private-key cryptography
Both
None of these
512 bits
1024 bits
N x 1024bits
N x 512 bits
Conventional cryptosystem
Asymmetric cryptosystem
Caesar's cryptosystem
All of these
The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
All of the mentioned above
Byte Substitution
Shift Row
Mix Column and Key Addition
All of the mentioned above
Brutally forcing the user to share the useful information like pins and passwords.
Trying every possible key to decrypt the message.
One entity pretends to be some other entity
The message or information is modified before sending it to the receiver.
Caesar cipher
Vernam cipher
Playfair cipher
None of the above
Randomize the decryption
Randomize the encryption
Minimize and maximize the randomization
None of the mentioned above
Parallel encryption of blocks of bits is possible
It is a faster way of encryption.
Simple way of the block cipher.
All of the mentioned above
System approach
Cyber safe
Cryptography
None of the mentioned above
Next block
Previous block
Middle block
All of the mentioned above
The input text is divided into two parts: one being left half and another one being right half.
Swapping of the left and right halves are performed after each round.
The plain text is converted into a matrix form first
None of the above
1
4
6
3
Encrypted message
Algorithm for performing encryption and decryption
Both algorithm for performing encryption and decryption and encrypted message
Decrypted message
Data Confidentiality
Data Integrity
Authentication
None of the above
For large block sizes
For fixed block sizes
For small block sizes
None of the above
Output type
Input type
Process type
All of the mentioned above
Rail fence cipher
Data Encryption Standard (DES)
Advance Encryption Standard (AES)
None of the above
asymmetric-key
logical-key
symmetric-key
None of these
Hashing
Decryption
Processing
None of the mentioned above
Fixed size
Variable
Integration
All of the mentioned above
Hash Functions are mathematical functions
They compress the input values
The hash functions work on arbitrary length input but produces fixed length output.
None of the above
Independent Decryption Environment Analysis
International Defense Encryption Area
International Data Encryption Algorithm
None of the above
5 similar rounds having 2 pair ; every alternate
9 ; the last
8 ; the first and last
10 ; no
Unsecured data
Secured data
Insecure
None of the mentioned above