You are on page 1of 4

In cryptography, what is cipher?

In asymmetric key cryptography, the private key is kept by


Which one of the following algorithm is not used in asymmetric-key cryptography?
In cryptography, the order of the letters in a message is rearranged by
What is data encryption standard (DES)?
Cryptanalysis is used
Which one of the following is a cryptographic protocol used to secure HTTP connection?
A substitution cipher substitutes one symbol with
An asymmetric-key (or public-key) cipher uses
Substitutional cipers are
Heart of Data Encryption Standard (DES), is the
DES stands for
Cryptography algorithms (ciphers) are divided into
A substitution cipher replaces one symbol with
In Cryptography, original message, before being transformed, is called
An encryption algorithm transforms plaintext into
Data Encryption Standard (DES), was designed by
In symmetric key cryptography, key used by sender and receiver is
In symmetric-key cryptography, same key is used by
Keys used in cryptography are
Cryptography, a word with Greek origins, means
A transposition cipher reorders (permutes) symbols in a
Cryptography can provide
RSA stands for
A combination of an encryption algorithm and a decryption algorithm is called a ________.
The set of all real numbers under the usual multiplication operation is not a group since
If (G, .) is a group, such that (ab)2 = a2 b2 a, b G, then G is a/an
Smallest prime number is
Largest prime number less than 20 is
DES has an initial and final permutation block and _________ rounds.
DES uses a key generator to generate sixteen _______ round keys.
________ DES was designed to increase the size of the DES key
One commonly used public-key cryptography method is the ______ algorithm.
The ________ method provides a one-time session key for two parties.
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not aut
One commonly used public-key cryptography method is the ______ algorithm.
___________are very crucial for success of RSA algorithm.
The cryptography algorithms used in S/MIME are _________.
_________ is a block cipher.
DES encrypts data in block size of __________ bits each.
algorithm for performing encryption and decryption
sender
RSA algorithm
transpositional ciphers
block cipher
to find some insecurity in a cryptographic scheme
stream control transmission protocol (SCTP)
Keys
1 Key
Monoalphabatic
Cipher
Data Encryption Standard
two groups
same symbol
Simple Text
Cipher text
Intel
shared
One Party
secret key
Corrupting Data
block of packets
entity authentication
Rivest, Shamir, Adleman
cipher
multiplication is not a binary operation
commutative semi group
4
16
14
32-bit
Double
RSS
Diffie-Hellman
man-in-the-middle
RSS
Integers.
IDEA.
DES.
64
encrypted message both (a) and (b)
receiver sender and receiver
diffie-hellman algorithm electronic code book algorithm
substitution ciphers both (a) and (b)
stream cipher bit cipher
to increase the speed to encrypt the data
transport layer security (TSL) explicit congestion notification (ECN)
Others Multi Parties
2 Key 3 Key
Sami alphabetic polyalphabetic
Rounds Encryption
Data Encryption Subscription Data Encryption Solutions
four groups one single group
provide two symbols for each another
Plain Text Empty Text
Simple Text Plain Text
IBM HP
different two keys are used
Multi Party Third Party
private key public key
Secret Writing Open Writing
block of slots block of signals
nonrepudiation of messages confidentiality
Roger, Shamir, Adrian Robert, Shamir, Anthoney
secret key
multiplication is not associative identity element does not exist
abelian group non-abelian group
2 3
15 19
15 16
48-bit 54-bit
Triple Quadruple
RAS RSA
RSA DES
ciphertext attack plaintext attack
RAS RSA
Prime numbers. Negative number.
RC4. RSA,DES-3.
IDEA. AES.
128 32
none of the mentioned a
all the connected devices to th b
none of the mentioned c
none of the mentioned a
none of the mentioned a
none of the mentioned a
resource reservation protocol b
Single Party B
4 Key b
both a and c d
DES function d
Data Encryption Slots a
None a
All of them c
Filled Text b
Empty Text a
Sony b
None a
Both Party d
All of them d
Closed Writing b
block of symbols d
All of them d
Rivest, Shaw, Adleman a
none of the above d
zero has no inverse d
none of these b
5 B
18 C
none of the above c
42-bit b
none of the above b
RAA c
AES a
none of the above a
RAA c
Fraction. b
RC5. c
RSA. a
56 a