adplus-dvertising
frame-decoration

Question

Data Encryption Standard is an example of a _____________ cryptosystem.

a.

conventional

b.

public key

c.

hash key

d.

asymmetric-key

Answer: (a).conventional

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Data Encryption Standard is an example of a _____________ cryptosystem.

Similar Questions

Discover Related MCQs

Q. _______________ cryptography deals with traditional characters, i.e., letters & digits directly.

Q. ____________ cryptography operates on binary-bit series and strings.

Q. __________ cryptography has always been focussing on the concept of ‘security through obscurity’.

Q. ________________ cryptography is based on publicly known mathematically designed algorithms to encrypt the information.

Q. _____________________ is the art & science of cracking the cipher-text without knowing the key.

Q. The process of disguising plaintext in such a way that its substance gets hidden (into what is known as cipher-text) is called _________________

Q. The method of reverting the encrypted text which is known as cipher text to its original form i.e. plain text is known as ________________

Q. Which of the following is not the primary objective of cryptography?

Q. Cryptography offers a set of required security services. Which of the following is not among that 4 required security services?

Q. A cryptosystem is also termed as ______________

Q. ______________ is the mathematical procedure or algorithm which produces a cipher-text for any specified plaintext.

Q. _______________ takes the plain text and the key as input for creating cipher-text.

Q. ____________________ is a mathematical algorithm that produces a unique plain text for a given cipher text along with a decryption key.

Q. A set of all probable decryption keys are collectively termed as ____________

Q. Encryption-decryption in cryptosystem is done in ______ ways.

Q. In _____________________ same keys are implemented for encrypting as well as decrypting the information.

Q. In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.

Q. A set of all probable decryption keys are collectively termed as key space.

Q. ____________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is replaced by another letter in creating the cipher-text.

Q. _____________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.