Question
a.
SSL
b.
TLS
c.
FTP
d.
WEP
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which one of the following RC4 algorithm not used in?
Similar Questions
Discover Related MCQs
Q. Which of these is not a characteristic of block ciphers?
View solution
Q. Which RC5 mode will have the ciphertext longer than the plaintext by at most the size of a single RC5 block?
View solution
Q. Which one of the following is not a RC5 mode of operation?
View solution
Q. “RC5 uses the Feistel Structure.”
View solution
Q. RC5 encryption uses Right shift and decryption uses Left shift.
View solution
Q. Calculate the number of subkeys required in RC5 for 18 rounds of computation.
View solution
Q. The value of the golden ratio is
View solution
Q. The value of the base of natural logarithms is
View solution
Q. RC5 uses 2 magic constants to define their subkeys. These are
View solution
Q. The total number of subkeys t used in the RC5 algorithm is given by the formula (r corresponds to number of rounds)
View solution
Q. The standard/nominal version of the RC5-w/r/b has parameters w/r/b as
View solution
Q. The number of rounds in RC5 can range from 0 to _____________
View solution
Q. What are the allowable values of word size in bit for RC5 algorithm?
View solution
Q. Which of the following is true for the RC5 algorithm?
i) Has variable number of rounds
ii) Has fixed Key length
iii) High memory Requirements
iv) Uses only primitive computational operations commonly found on microprocessors
View solution
Q. Which of the following statements are true with respect to the blowfish algorithm –
i) Provided key is large enough, brute-force key search is not practical, especially given the high key schedule cost
ii) Key dependent S-boxes and sub keys make analysis very difficult
iii) Changing both halves in each round increases security
iv) Blowfish has improved avalanche effects
View solution
Q. The 32bit output of s-box 1 is XORed with s-box 2.
View solution
Q. A single blowfish s-box converts 8-bits to _________ bits.
View solution
Q. What is the number of iterations required in total to generate all the sub-keys in blowfish?
View solution
Q. P15 gets XORed with
View solution
Q. P17 gets XORed with
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!