Cryptography Cryptography Overview Ii Online Exam Quiz
Cryptography Cryptography Overview Ii GK Quiz. Question and Answers related to Cryptography Cryptography Overview Ii. MCQ (Multiple Choice Questions with answers about Cryptography Cryptography Overview Ii
The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes.
Options
A : 4096
B : 4608
C : 4168
D : 4864
The multiplicative Inverse of 550 mod 1769 is –
Options
A : 434
B : 224
C : 550
D : Does not exist
Which one of the following modes of operation in DES is used for operating short data?
Options
A : Cipher Feedback Mode (CFB)
B : Cipher Block chaining (CBC)
C : Electronic code book (ECB)
D : Output Feedback Modes (OFB)
Which of the following is the correct encryption statement representation for the XTS-AES mode?
Options
A : E(K1,P) XOR T
B : E(K2,T) XOR P
C : E(K1,T XOR P) XOR P
D : E(K1,P XOR T) XOR T
For the group Sn of all permutations of n distinct symbols, what is the number of elements in Sn?
Options
A : n
B : n-1
C : 2n
D : n!
The last two blocks of the XTS-AES mode are
Options
A : padded as 10*
B : encrypted/ decrypted using ciphertext-stealing
C : padded as 10*1
D : padded and then swapped after encryption/ decryption
Certificate extensions fall into 3 categories. Which one of the following is not a Certificate extensions category?
Options
A : Subject and Issuer attributes
B : Key and Policy information
C : Certification path constraints
D : All of the above are Certificate extensions categories
It is desirable to revoke a certificate before it expires because –
Options
A : the user is no longer certified by this CA
B : the CA’s certificate is assumed to be compromised
C : the user’s private key is assumed to be compromised
D : all of the mentioned
A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other’s public key for future – a technique known as ____________
Options
A : time stamping
B : polling
C : caching
D : squeezing
Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, the correct order of this chain is represented as –
Options
A : X2 X1 X1 B
B : X1 X1 X2 A
C : X1 X2 X2 B
D : X1 X2 X2 A
Chemical Engineering Basics - Part 1 more Online Exam Quiz
Cryptography Cryptography Overview I
Cryptography Cryptography Overview Iii
Cryptography Public Key Xcertificates I
Cryptography Public Key Xcertificates Ii