DBATU Model MCQ – Cryptography And System Security

[adinserter block="1"]

Welcome to your Cryptography And System Security, dated May 8, 2024

1. 

The keys used in cryptography areDeselect Answer

2. 

A straight permutation cipher or a straight P-box has the same number of inputs as

Deselect Answer

3. 

The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not

Deselect Answer

4. 

The shift cipher is sometimes referred to as the

Deselect Answer

5. 

The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and

Deselect Answer

6. 

 Data Encryption Standard (DES), was designed by

Deselect Answer

7. 

In symmetric-key cryptography, the same key is used by

Deselect Answer

8. 

The relationship between a character in the plaintext to a character is

Deselect Answer

9. 

 The cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits of

Deselect Answer

10. 

 RSA stands for

Deselect Answer

[adinserter block="1"]