The Art of Cryptography
The Art of Cryptography
- Which of the following poses challenges in the breaking of the Vigenère Cipher?
SECRECY OF KEY (wrong)
- The process that attempts to understand the art and science of encryption and decryption is
known as __________.
CRYPTOGRAPHY (wrong)
- The cryptographic device based on rotor systems, used by the Germans during World War II is
___
ENIGMA
- The security principle that contradicts the idea of “security through obscurity” is _________.
KERCHOFF'S PRINCIPLE
- The cipher generated by combining multiple transformations to enhance the security of the
resultant cipher is __________.
POLYALPHABETIC CIPHERS
- The strategy used to ensure that the message is a multiple of the cipher block size without
compromising the size of the ciphertext is ___
CIPHERTEXT STEALING
- A widely used encryption algorithm that superseded DES as the new standard encryption
algorithm is ________.
RIJNDAEL
- Based on the network security protocols, which of the following algorithms are used to
generate message digests?
MD5
- Which among the following are steps in each round of AES algorithm?
SUBSTITUTE BYTES
- X signs a message digitally and sends it to Y. Which of the following is required for Y to verify
the authenticity of the message?
X'S PUBLIC KEY
- Which among the following is the most desirable property to enhance the computational
complexity of cryptosystems?
COMPLEXITY OF THE ALGORITHM
- Which among the following algorithms is designed based on the Feistel Cipher?
DES