adplus-dvertising
frame-decoration

Question

Match the following symmetric block ciphers with corresponding block and key sizes:

List - I
(a) DES
(b) IDEA
(c) BLOW FISH
(d) AES

List - II
(i) block size 64 and key size ranges between 32 and 448
(ii) block size 64 and key size 64
(iii) block size 128 and key sizes 128, 192, 256
(iv) block size 64 and key size 128

Code:
(a) (b) (c) (d)

a.

(iv) (ii) (i) (iii)

b.

(ii) (iv) (i) (iii)

c.

(ii) (iv) (iii) (i)

d.

(iv) (ii) (iii) (i)

Answer: (b).(ii) (iv) (i) (iii)

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Match the following symmetric block ciphers with corresponding block and key sizes: List - I (a) DES (b) IDEA (c) BLOW FISH (d) AES List - II (i) block size 64 and key...

Similar Questions

Discover Related MCQs

Q. Which of the following statements are true?

(a) Three broad categories of Networks are
(i) Circuit Switched Networks
(ii) Packet Switched Networks
(iii) Message Switched Networks
(b) Circuit Switched Network resources need not be reserved during the set up phase.
(c) In packet switching there is no resource allocation for packets.

Q. In Challenge-Response authentication the claimant ...............

Q. Decrypt the message “WTAAD” using the Caesar Cipher with key=15.

Q. To guarantee correction of upto t errors, the minimum Hamming distance dmin in a block code must be ................

Q. Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address?

Q. .................. do not take their decisions on measurements or estimates of the current traffic and topology.

Q. The number of bits used for addressing in Gigabit Ethernet is ...................

Q. Which of the following layer of OSI Reference model is also called end-to-end layer?

Q. The IP address ................... is used by hosts when they are being booted.

Q. Suppose we want to download text documents at the rate of 100 pages per second. Assume that a page consists of an average of 24 lines with 80 characters in each line. What is the required bit rate of the channel?

Q. Quadrature Amplitude Modulation means changing both:

Q. If a file consisting of 50,000 characters takes 40 seconds to send, then the data rate is ........................

Q. Match the following:

List - I
(a) Data link layer
(b) Network layer
(c) Transport layer
(d) Presentation layer

List - II
(i) Encryption
(ii) Connection control
(iii) Routing
(iv) Framing

Code :
(a) (b) (c) (d)

Q. The address of a class B host is to be split into subnets with a 6 - bit subnet number. What is the maximum number of subnets and maximum number of hosts in each subnet?

Q. Which of the following statements are true?

(a) The fragmentation fields in the base header section of IPv4 have moved to the fragmentation extension header in IPv6.
(b) The authentication extension header is new in IPv6.
(c) The record route option is not implemented in IPv6.

Q. Which of the following routing technique / techniques is / are used in distributed systems?

(a) Fixed Routing
(b) Virtual Routing
(c) Dynamic Routing