Question: ____________ciphers, changes the order in which the elements appear in the sequence to produce the ciphertext. a.Monoalphabetic b.DES c.AES d.Rail-Fence Question text ________________ to prove
____________ciphers, changes the order in which the elements appear in the sequence to produce the ciphertext.
a.Monoalphabetic
b.DES
c.AES
d.Rail-Fence
Question text
________________ to prove the source and integrity of the data unit (message) and protect against forgery
a.Steganography
b.Cryptanalysis
c.Cryptography
d.Digital Signature
Question text
Which of the following public key distribution technique, broadcast the key to the large community?
a.Public announcement
b.Publicly available directory
c.Public-key authority
d.Public-key certificates
Which of the following is NOT the uses of public key cryptosystem?
a.Digital Signature
b.Key Exchange
c.Encryption and Decryption
d.Data Analysis
Question text
Which of the following cipher implements Shannons S-P net concept?
a.Feistel
b.AES
c.OTP
d.Caesar
Which of the following retains authorship and integrity of distributed software programs?
a.Personal Certificates
b.Organization Certificate
c.Server Certificates
d.
Developer Certificates
Question text
________________ ciphers process messages a bit or byte at a time when encrypting/decrypting.
a.Stream
b.Block
c.Asymmetric
d.Symmetric
Question text
A change in one bit of the plaintext or one bit of the key should produce a change in many bits of the cipher text is known as ____________________ effect
a.Substitution
b.Avalanche
c.Digital
d.Transposition
Question text
Cryptanalyst in ROP of Oman, trying all possible key option to find the plain text from the cipher text. This action is know is ____________________________
a.Cryptography
b.Steganography
c.Brute-force attack
d.Cryptanalytic attack
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
