DBATU Model MCQ – Cryptography And System Security Views: 92 [adinserter block="1"] Welcome to your Cryptography And System Security, dated September 9, 2024 1. The keys used in cryptography areDeselect Answer secret key Private key Public key All of these None 2. A straight permutation cipher or a straight P-box has the same number of inputs asDeselect Answer cipher Frames Outputs Bits None 3. The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are notDeselect Answer Authenticated Joined Submit Separate None 4. The shift cipher is sometimes referred to as theDeselect Answer Shift cipher Caesar cipher cipher cipher text None 5. The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds andDeselect Answer Data Size Round Size Key Size Encryption Size None 6. Data Encryption Standard (DES), was designed byDeselect Answer Intel IBM HP Sony None 7. In symmetric-key cryptography, the same key is used byDeselect Answer One Party Multi Party Third Party Both Party None 8. The relationship between a character in the plaintext to a character isDeselect Answer many-to-one relationship one-to-many relationship many-to-many relationship None None 9. The cipher feedback (CFB) mode was created for those situations in which we need to send or receive r bits ofDeselect Answer Frames Data Pixels Encryption None 10. RSA stands forDeselect Answer Rivest, Shamir, Adleman Roger, Shamir, Adrian Robert, Shamir, Anthoney Rivest, Shaw, Adleman None Please fill in the comment box below. [adinserter block="1"]