Cryptography Cryptography Overview Ii Online Exam Quiz

Cryptography Cryptography Overview Ii GK Quiz. Question and Answers related to Cryptography Cryptography Overview Ii. MCQ (Multiple Choice Questions with answers about Cryptography Cryptography Overview Ii

The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes.

Options

A : 4096

B : 4608

C : 4168

D : 4864

View Answer

The multiplicative Inverse of 550 mod 1769 is –

Options

A : 434

B : 224

C : 550

D : Does not exist

View Answer

Which one of the following modes of operation in DES is used for operating short data?

Options

A : Cipher Feedback Mode (CFB)

B : Cipher Block chaining (CBC)

C : Electronic code book (ECB)

D : Output Feedback Modes (OFB)

View Answer

Which of the following is the correct encryption statement representation for the XTS-AES mode?

Options

A : E(K1,P) XOR T

B : E(K2,T) XOR P

C : E(K1,T XOR P) XOR P

D : E(K1,P XOR T) XOR T

View Answer

For the group Sn of all permutations of n distinct symbols, what is the number of elements in Sn?

Options

A : n

B : n-1

C : 2n

D : n!

View Answer

The last two blocks of the XTS-AES mode are

Options

A : padded as 10*

B : encrypted/ decrypted using ciphertext-stealing

C : padded as 10*1

D : padded and then swapped after encryption/ decryption

View Answer

Certificate extensions fall into 3 categories. Which one of the following is not a Certificate extensions category?

Options

A : Subject and Issuer attributes

B : Key and Policy information

C : Certification path constraints

D : All of the above are Certificate extensions categories

View Answer

It is desirable to revoke a certificate before it expires because –

Options

A : the user is no longer certified by this CA

B : the CA’s certificate is assumed to be compromised

C : the user’s private key is assumed to be compromised

D : all of the mentioned

View Answer

A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other’s public key for future – a technique known as ____________

Options

A : time stamping

B : polling

C : caching

D : squeezing

View Answer

Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, the correct order of this chain is represented as –

Options

A : X2 X1 X1 B

B : X1 X1 X2 A

C : X1 X2 X2 B

D : X1 X2 X2 A

View Answer

Chemical Engineering Basics - Part 1 more Online Exam Quiz

Electromagnetic Theory Test

Electromagnetic Theory Tough

Electromagnetic Theory Tricky

Basic Cryptography

Cryptography Cryptography Overview I

Cryptography Cryptography Overview Iii

Cryptography Public Key Xcertificates I

Cryptography Public Key Xcertificates Ii

Cryptography Symmetric Key Distribution I

Biochemistry Advanced