Home » Cyber Security » Cryptography in Security
Que.______________ is the mathematical procedure or algorithm which produces a cipher-text for any specified plaintext. a. Encryption Algorithm b. Decryption Algorithm c. Hashing Algorithm d. Tuning Algorithm
Que._______________ takes the plain text and the key as input for creating cipher-text. a. Decryption Algorithm b. Hashing Algorithm c. Tuning Algorithm d. Encryption Algorithm
Que.____________________ is a mathematical algorithm that produces a unique plain text for a given cipher text along with a decryption key. a. Decryption Algorithm b. Hashing Algorithm c. Tuning Algorithm d. Encryption Algorithm
Que.A set of all probable decryption keys are collectively termed as ____________ a. key-stack b. key bunch c. key space d. key pack
Que.Encryption-decryption in cryptosystem is done in ______ ways. a. 4 b. 3 c. 5 d. 2
Que.In _____________________ same keys are implemented for encrypting as well as decrypting the information. a. Symmetric Key Encryption b. Asymmetric Key Encryption c. Asymmetric Key Decryption d. Hash-based Key Encryption
Que.In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information. a. Symmetric Key Encryption b. Asymmetric Key Encryption c. Asymmetric Key Decryption d. Hash-based Key Encryption
Show Answer Asymmetric Key Encryption
Que.A set of all probable decryption keys are collectively termed as key space. a. True b. False c. May be True or False d. Can’t say
Que.____________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is replaced by another letter in creating the cipher-text. a. Polyalphabetic Cipher b. Caesar Cipher c. Playfair Cipher d. Monoalphabetic Cipher
Que._____________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity. a. Rolling Cipher b. Shift Cipher c. Playfair Cipher d. Block Cipher