DBATU Model MCQ – Cryptography And System Security

[adinserter block="1"]

Welcome to your Cryptography And System Security, dated August 3, 2021

1. The keys used in cryptography areDeselect Answer
2.

A straight permutation cipher or a straight P-box has the same number of inputs as

3.

The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not

4.

The shift cipher is sometimes referred to as the

5.

The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and

6.

Data Encryption Standard (DES), was designed by

7.

In symmetric-key cryptography, the same key is used by

8.

The relationship between a character in the plaintext to a character is

[adinserter block="1"]