Q:
The plain text for the cipher text RRLMWBKASPDH. Given the encryption key [(17 17 5 | 21 18 21 | 2 2 19)] is –
belongs to collection: CRYPTOGRAPHY BASICS MCQ
CRYPTOGRAPHY BASICS MCQ
- Bob selects E67(2, 3) as the elliptic curve over GF(p). He selects e1 = (2, 22) and d = 4
- Which among the following values: 17, 20, 38, and 50, does not have primitive roots in the group G = <Zn∗, ×>?
- Find the solution of x^2≡3 mod 23
- In Elgamal cryptosystem, given the prime p=31. Encrypt the message “HELLO”; use 00 to 25 for encoding. The value of C2 for character ‘L’ is
- In Elgamal cryptosystem, given the prime p=31. What is the respective plaintext character for C = (27, 20)?
- The multiplicative Inverse of 550 mod 1769 is –
- It is desirable to revoke a certificate before it expires because –
- Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, the correct order of this chain is represented as –
- A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other’s public key for future – a technique known as ____________
- Which of the following statements are true?
- The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes
- Which of the following statements are true with respect to the blowfish algorithm?
- The last two blocks of the XTS-AES mode are
- How many keys are used in the ANSI X9.17 PRNG?
- Maurer’s Universal Statistical Test is
- On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text
- Consider the cipher text message: YJIHX RVHKK KSKHK IQQEV IFLRK QUZVA EVFYZ RVFBX UKGBP KYVVB QTAJK TGBQO ISGHU CWIKX QUXIH DUGIU LMWKG CHXJV WEKIH HEHGR EXXSF DMIIL UPSLW UPSLW AJKTR WTOWP IVXBW NPTGW EKBYU SBQWS Relative Frequencies 3 7 2 2 5 5 7 9 11 4 14 4 2 1 3 4 6 5 6 5 7 10 9 8 4 2 The Ind
- The plain text for the cipher text RRLMWBKASPDH. Given the encryption key [(17 17 5 | 21 18 21 | 2 2 19)] is –
- The Inverse S-box value for byte stored in cell (D,2)
- Division of (131B6C3) base 16 by (lA2F) base 16 yeilds
- The inverse s-box permutation follows
- In the DES algorithm the Round Input is 32 bits, which is expanded to 48 bits via ______________
- Using Differential Crypt-analysis, the minimum computations required to decipher the DES algorithm is-
- Using SDES, the Plaintext for the Ciphertext 00001111, given that the key is 1111111111 is,
- A substitution cipher substitutes one symbol with
- An asymmetric-key (or public-key) cipher uses
- A straight permutation cipher or a straight P-box has the same number of inputs as
- We use Cryptography term to transforming messages to make them secure and immune to
- The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
- In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
- The shift cipher is sometimes referred to as the
- The substitutional cipers are
- The heart of Data Encryption Standard (DES), is the
- DES stands for
- The cryptography algorithms (ciphers) are divided into
- A substitution cipher replaces one symbol with
- The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and
- In Cryptography, the original message, before being transformed, is called
- In Cryptography, the input bits are rotated to right or left in
- Which one is a common software fault tolerant model for safety critical jobs such as flight control software?
- An encryption algorithm transforms the plaintext into
- For RSA to work, the value of P must be less than the value of
- The International Data Encryption Algorithm (IDEA) was developed by
- Data Encryption Standard (DES), was designed by
- In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is
- The ciphers of today are called
- In symmetric-key cryptography, the same key is used by
- In symmetric-key cryptography, the key locks and unlocks the box is
- The keys used in cryptography are
- The ciphers of today are called round ciphers because they involve
- The relationship between a character in the plaintext to a character is
- Cryptography, a word with Greek origins, means
- Symmetric-key cryptography started thousands of years ago when people needed to exchange
- In Rotation Cipher, keyless rotation the number of rotations is
- In symmetric key cryptography, the key used by the sender and the receiver is
- A transposition cipher reorders (permutes) symbols in aa
- The cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of
- In Cryptography, when text is treated at the bit level, each character is replaced by
- The Advanced Encryption Standard (AES) was designed
- ECB stands for
- The cipher which uses the exclusive-or operation as defined in computer science is called
- The Cryptography can provide
- The shift cipheris sometimes referred to as the
- RSA stands for
- The Data Encryption Standard (DES) was designed by
- The process of transforming plain text to unreadable text
- An algorithm used in encryption is referred to as cipher
- A process of making the encrypted text readable again
- WTLS stands for?
- The protocol designed to make the security of wireless LAN as good as that of wired LAN
- A person who enjoys learning details about computers and how to enhance their capabilities
- A program created by Farmer and Venema for auditing capability
- A program that copies itself
- An attack in which the site is not capable of answering valid request
- A cipher in which the order is not preserved
- Plain text is the data after encryption is performed
- A unique piece of information that is used in encryption
- Study of creating a d using encryption and decryption techniques
- Creating a computer or paper audit that can help detect wrong doings
- An indirect form of surveillance
- A malicious code hidden inside a seemingly harmless piece of code
- Attack in which a user creates a packet that appears to be something else
- A technique in which a program attacks a network by exploiting IP broadcast addressing operations
- An attack in which the user receives unwanted amount of e-mails
- These ciphers replace a character or characters with a different character or characters, based on some key
- Encryption is the study of creating and using decryption techniques
- A type of cipher that uses multiple alphabetic strings
- An encryption technique with 2 keys is ______________
- In public key cryptography, a key that decrypts the message
- DES stands for?
- Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption
- Triple-DES has ______ keys
- Encryption standard that is selected by the US government to replace DES
- An electronic document that establishes your credentials when you are performing transactions
- ___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks
- In a database where the encryption is applied the data is cannot be handled by the unauthorised user without
- Which of the following is not a property of good encryption technique ?
- In which of the following encryption key is used to encrypt and decrypt the data ?
- Encryption of small values, such as identifiers or names, is made complicated by the possibility of __________
- Which one of the following uses a 128bit round key to encrypt the data using XOR and use it in reverse to decrypt it ?
- Which of the following requires no password travel across the internet ?
- Assymmetric Encryption: Why can a message encrypted with the Public Key only be decrypted with the receiver’s appropriate Private Key?
- Which is the largest disadvantage of the symmetric Encryption?
- Which is the principle of the encryption using a key?
(a).PAYMOREMONEY
need an explanation for this answer? contact us directly to get an explanation for this answer