388 views

Uploaded by Shesh Narayan Mishra

cryptography mcq

cryptography mcq

© All Rights Reserved

- Encryption Policy for the 21st Century: A Future without Government-Prescribed Key Recovery, Cato Policy Analysis
- Cryptography
- (03-08) an Overview of Modern Cryptography
- An Uncompressed Image Encryption Algorithm Based on DNA Sequences
- A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and Transposition
- CIB
- ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
- Ciphertext-Policy Attribute-Based Encryption
- Dont You
- Quadrate Design of Linear System for Color Image Encryption
- IBM System Storage DS8700 Disk Encryption Redp4500
- Kittler Code
- Syllabus 8th Sem
- OSP Optimized Security Protocol for Wireless Sensor Networks
- public key criptography
- ET011_v1.1_Cryptography_Basics.pdf
- Ijret - Transmission of Cryptic Text Using Rotational Visual Cryptography
- RSA Cryptography KC LG
- Network Security in Embedded System Using TLS.pdf
- SECRET IMAGE TRANSMISSION THROUGH MOSAIC IMAGE

You are on page 1of 4

Which one of the following algorithm is not used in asymmetric-key cryptography?

In cryptography, the order of the letters in a message is rearranged by

What is data encryption standard (DES)?

Cryptanalysis is used

Which one of the following is a cryptographic protocol used to secure HTTP connection?

A substitution cipher substitutes one symbol with

An asymmetric-key (or public-key) cipher uses

Substitutional cipers are

Heart of Data Encryption Standard (DES), is the

DES stands for

Cryptography algorithms (ciphers) are divided into

A substitution cipher replaces one symbol with

In Cryptography, original message, before being transformed, is called

An encryption algorithm transforms plaintext into

Data Encryption Standard (DES), was designed by

In symmetric key cryptography, key used by sender and receiver is

In symmetric-key cryptography, same key is used by

Keys used in cryptography are

Cryptography, a word with Greek origins, means

A transposition cipher reorders (permutes) symbols in a

Cryptography can provide

RSA stands for

A combination of an encryption algorithm and a decryption algorithm is called a ________.

The set of all real numbers under the usual multiplication operation is not a group since

If (G, .) is a group, such that (ab)2 = a2 b2 a, b G, then G is a/an

Smallest prime number is

Largest prime number less than 20 is

DES has an initial and final permutation block and _________ rounds.

DES uses a key generator to generate sixteen _______ round keys.

________ DES was designed to increase the size of the DES key

One commonly used public-key cryptography method is the ______ algorithm.

The ________ method provides a one-time session key for two parties.

The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not aut

One commonly used public-key cryptography method is the ______ algorithm.

___________are very crucial for success of RSA algorithm.

The cryptography algorithms used in S/MIME are _________.

_________ is a block cipher.

DES encrypts data in block size of __________ bits each.

algorithm for performing encryption and decryption

sender

RSA algorithm

transpositional ciphers

block cipher

to find some insecurity in a cryptographic scheme

stream control transmission protocol (SCTP)

Keys

1 Key

Monoalphabatic

Cipher

Data Encryption Standard

two groups

same symbol

Simple Text

Cipher text

Intel

shared

One Party

secret key

Corrupting Data

block of packets

entity authentication

Rivest, Shamir, Adleman

cipher

multiplication is not a binary operation

commutative semi group

4

16

14

32-bit

Double

RSS

Diffie-Hellman

man-in-the-middle

RSS

Integers.

IDEA.

DES.

64

encrypted message both (a) and (b)

receiver sender and receiver

diffie-hellman algorithm electronic code book algorithm

substitution ciphers both (a) and (b)

stream cipher bit cipher

to increase the speed to encrypt the data

transport layer security (TSL) explicit congestion notification (ECN)

Others Multi Parties

2 Key 3 Key

Sami alphabetic polyalphabetic

Rounds Encryption

Data Encryption Subscription Data Encryption Solutions

four groups one single group

provide two symbols for each another

Plain Text Empty Text

Simple Text Plain Text

IBM HP

different two keys are used

Multi Party Third Party

private key public key

Secret Writing Open Writing

block of slots block of signals

nonrepudiation of messages confidentiality

Roger, Shamir, Adrian Robert, Shamir, Anthoney

secret key

multiplication is not associative identity element does not exist

abelian group non-abelian group

2 3

15 19

15 16

48-bit 54-bit

Triple Quadruple

RAS RSA

RSA DES

ciphertext attack plaintext attack

RAS RSA

Prime numbers. Negative number.

RC4. RSA,DES-3.

IDEA. AES.

128 32

none of the mentioned a

all the connected devices to th b

none of the mentioned c

none of the mentioned a

none of the mentioned a

none of the mentioned a

resource reservation protocol b

Single Party B

4 Key b

both a and c d

DES function d

Data Encryption Slots a

None a

All of them c

Filled Text b

Empty Text a

Sony b

None a

Both Party d

All of them d

Closed Writing b

block of symbols d

All of them d

Rivest, Shaw, Adleman a

none of the above d

zero has no inverse d

none of these b

5 B

18 C

none of the above c

42-bit b

none of the above b

RAA c

AES a

none of the above a

RAA c

Fraction. b

RC5. c

RSA. a

56 a

- Encryption Policy for the 21st Century: A Future without Government-Prescribed Key Recovery, Cato Policy AnalysisUploaded byCato Institute
- CryptographyUploaded byVikram Chandel
- (03-08) an Overview of Modern CryptographyUploaded bycflores81
- An Uncompressed Image Encryption Algorithm Based on DNA SequencesUploaded byCS & IT
- A Cryptographic Key Generation on a 2D Graphics using RGB pixel Shuffling and TranspositionUploaded byIOSRjournal
- CIBUploaded byShy Drooler
- ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYUploaded byIJeete
- Ciphertext-Policy Attribute-Based EncryptionUploaded byJ_Ramesh
- Dont YouUploaded byIkhlaz Thsc Tuwuntjaki
- Quadrate Design of Linear System for Color Image EncryptionUploaded byijcsis
- IBM System Storage DS8700 Disk Encryption Redp4500Uploaded bybupbechanh
- Kittler CodeUploaded byDaniel Nachmanowicz
- Syllabus 8th SemUploaded byMeghali Deb Roy
- OSP Optimized Security Protocol for Wireless Sensor NetworksUploaded byRuhmaTahir
- public key criptographyUploaded byPrem Raj
- ET011_v1.1_Cryptography_Basics.pdfUploaded byWayne Ash
- Ijret - Transmission of Cryptic Text Using Rotational Visual CryptographyUploaded byInternational Journal of Research in Engineering and Technology
- RSA Cryptography KC LGUploaded byAvijeet Banerjee
- Network Security in Embedded System Using TLS.pdfUploaded byOzy Nirvana
- SECRET IMAGE TRANSMISSION THROUGH MOSAIC IMAGEUploaded byCS & IT
- Cryptographic Secured Communication for Militory ApplicationUploaded byRaghav Shetty
- Is AssignmentUploaded byAruna Rao
- RSA.pptUploaded byRajesh Kumar
- 7Uploaded byArnav Guddu
- [Ar] Security; Mathematics Behind Security FeaturesUploaded byآركان الدين ياسين
- SecurityUploaded byNiharika
- New Text DocumentUploaded byNitesh Chitti
- A Calculus for Secure Channel Establishment in Open NetworksUploaded byΟλυμπίδης Ιωάννης
- securitareaUploaded byXozan
- CS408-02 PaperUploaded byKatrina Walczyk

- IELTS Writing Task 2 Essay StructuresUploaded byBryar Hassan
- Villanueva Notes SalesUploaded byGabriel Pachoro
- my teaching resumeUploaded byapi-289579932
- Looking inside for competitive advantageUploaded byxaxif8265
- The Merciad, Feb. 11, 1999Uploaded byTheMerciad
- White Paper Computer System ValidationUploaded byakbarmulangath
- Pirate Ship Name GeneratorUploaded byLeeroy
- Misallette2Uploaded bykathyuy
- Evidence CasesUploaded bytirsollantada
- Philippine Stock Market AnalysisUploaded byJapol Arban
- Extension WorksheetsUploaded byMaru Garcia Garcia
- Chopin s Polish BalladeUploaded bySoni Petrovski
- 28. American Home vs. FF Cruz (Digest).docxUploaded byClarissa dela Cruz
- 30yearsandthreedeaths-killerwhalearticle docxUploaded byapi-285768106
- Discrete Maths 2002 Lecture 28 3 Slides PpUploaded byapi-26021617
- Sibis Book - Chapter 1 - BaburUploaded byMuthuprakash Ravindran
- TOPLAS.pdfUploaded bybrk_318
- CS6711 Security Lab ManualUploaded bySwaroop A S
- The Incidence of Preeclampsia and EclampsiaUploaded byBobby Fitriantoni
- all collUploaded bykavinkumarjack
- Hist 436 (Vietnam) Term PaperUploaded byTiffany Gross
- April Newsletter 2016Uploaded byMichael O Connor
- Caterpillar 773D Electrical circuit diagramUploaded byveeresh
- Jim Leftwich_ CollabFestNotes 61-83Uploaded byeexxiitt
- Allied Bank Limited (ABL)Uploaded byHussain Zahid
- Lesson Plan Ju Negeri 2013 (Group1)Uploaded byena_cutediva
- The One and the Many_ Adjudication in Collegial CourtsUploaded byMarildaPsilveira
- Dream Village Neighborhood Association vs. BCDA DigestUploaded byJanina Rose Javelosa
- Bolero Invader 4x4 Ownership Review - Team-BHPUploaded bySuman K Choudhary
- Assefacv CbeUploaded byTekelemariam Fitwi