Computer Networks » Cryptography
In cryptography, what is cipher?
A. Algorithm for performing encryption and decryption
B. Encrypted message
C. Both algorithm for performing encryption and decryption and encrypted message
D. Decrypted message
Read more about this MCQ
In asymmetric key cryptography, the private key is kept by __________
A. Sender
B. Receiver
C. Sender and receiver
D. All the connected devices to the network
Read more about this MCQ
Which one of the following algorithm is not used in asymmetric-key cryptography?
A. Rsa algorithm
B. Diffie-hellman algorithm
C. Electronic code book algorithm
D. Dsa algorithm
Read more about this MCQ
In cryptography, the order of the letters in a message is rearranged by __________
A. Transpositional ciphers
B. Substitution ciphers
C. Both transpositional ciphers and substitution ciphers
D. Quadratic ciphers
Read more about this MCQ
What is data encryption standard (DES)?
A. Block cipher
B. Stream cipher
C. Bit cipher
D. Byte cipher
Read more about this MCQ
Cryptanalysis is used __________
A. To find some insecurity in a cryptographic scheme
B. To increase the speed
C. To encrypt the data
D. To make new ciphers
Read more about this MCQ
Which one of the following is a cryptographic protocol used to secure HTTP connection?
A. Stream control transmission protocol (sctp)
B. Transport layer security (tls)
C. Explicit congestion notification (ecn)
D. Resource reservation protocol
Read more about this MCQ
ElGamal encryption system is __________
A. Symmetric key encryption algorithm
B. Asymmetric key encryption algorithm
C. Not an encryption algorithm
D. Block cipher method
Read more about this MCQ
Cryptographic hash function takes an arbitrary block of data and returns _________
A. Fixed size bit string
B. Variable size bit string
C. Both fixed size bit string and variable size bit string
D. Variable sized byte string
Read more about this MCQ