DBATU Model MCQ – Cryptography And System Security Views: 81 [adinserter block="1"] Welcome to your Cryptography And System Security, dated May 31, 2023 1. The keys used in cryptography areDeselect Answer secret key Private key Public key All of these 2. A straight permutation cipher or a straight P-box has the same number of inputs asDeselect Answer cipher Frames Outputs Bits 3. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are notDeselect Answer Authenticated Joined Submit Separate 4. The shift cipher is sometimes referred to as theDeselect Answer Shift cipher Caesar cipher cipher cipher text 5. The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds andDeselect Answer Data Size Round Size Key Size Encryption Size 6. Data Encryption Standard (DES), was designed byDeselect Answer Intel IBM HP Sony 7. In symmetric-key cryptography, the same key is used byDeselect Answer One Party Multi Party Third Party Both Party 8. The relationship between a character in the plaintext to a character isDeselect Answer many-to-one relationship one-to-many relationship many-to-many relationship None 9. The cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits ofDeselect Answer Frames Data Pixels Encryption 10. RSA stands forDeselect Answer Rivest, Shamir, Adleman Roger, Shamir, Adrian Robert, Shamir, Anthoney Rivest, Shaw, Adleman Please fill in the comment box below. [adinserter block="1"]