Usha Mittal Institute of Technology
Usha Mittal Institute of Technology
Draft saved
Mamta Deshmukh
Your answer
Branch
ENC
EE
Clear selection
https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 1/6
10/14/21, 4:20 PM Usha Mittal Institute of Technology
Data Confidentiality
Data Integrity
Authentication
Clear selection
An integer values
A square matrix
Special Symbols
Function Keys
All of these
https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 2/6
10/14/21, 4:20 PM Usha Mittal Institute of Technology
asymmetric-key
logical-key
symmetric-key
None of these
Confidentiality
Authenticityn
Data integrityn
Non-repudiation
All of these
You are supposed to use hill cipher for encryption technique. You are provided
with the following matrix,A = [ 4 2 ] [2 1]
Yes
No
Can't be determined
Data insufficient
https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 3/6
10/14/21, 4:20 PM Usha Mittal Institute of Technology
What will be the ciphered text if the string “SANFOUNDRY” is given as input to
the code of playfair cipher with keyword as “SECRET” (assuming j is combined
with i)?
ZHQAPNPAFR
AHQAPNPAFR
HAQAPNPAFR
QHAAPNPAFR
What will be the ciphered text if the string “SANFOUNDRY” is given as input to
the code of vigenere cipher with keyword as “HELLO”?
UEWIIDKLL
ZEYQCOCM
ZEYQCBROCM
ZEYQCBROCMJDH
https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 4/6
10/14/21, 4:20 PM Usha Mittal Institute of Technology
Which one of the following modes of operation in DES is used for operating short
data?
Choose from among the following cipher systems, from best to the worst, with
respect to ease of decryption using frequency analysis.
nlazeiibljji
nlazeiibljii
olaaeiibljki
mlaaeiibljki
https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 5/6
10/14/21, 4:20 PM Usha Mittal Institute of Technology
AES uses a ________ bit block size and a key size of _____ bits.
128;128 or 256
64 ; 128 or 192
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service - Privacy Policy
Forms
https://docs.google.com/forms/d/e/1FAIpQLSc18M76UhRE2gFPYTuKR60vdEBV5YxY0GWGSD2ILP90iNOdzg/viewform?pru=AAABfKJxcyo*0wgekH… 6/6