Question
a.
cryptanalysis
b.
decryption
c.
reverse engineering
d.
encryption
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The process of disguising plaintext in such a way that its substance gets hidden (into what is known as cipher-text) is called _________________
Similar Questions
Discover Related MCQs
Q. The method of reverting the encrypted text which is known as cipher text to its original form i.e. plain text is known as ________________
View solution
Q. Which of the following is not the primary objective of cryptography?
View solution
Q. Cryptography offers a set of required security services. Which of the following is not among that 4 required security services?
View solution
Q. A cryptosystem is also termed as ______________
View solution
Q. ______________ is the mathematical procedure or algorithm which produces a cipher-text for any specified plaintext.
View solution
Q. _______________ takes the plain text and the key as input for creating cipher-text.
View solution
Q. ____________________ is a mathematical algorithm that produces a unique plain text for a given cipher text along with a decryption key.
View solution
Q. A set of all probable decryption keys are collectively termed as ____________
View solution
Q. Encryption-decryption in cryptosystem is done in ______ ways.
View solution
Q. In _____________________ same keys are implemented for encrypting as well as decrypting the information.
View solution
Q. In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.
View solution
Q. A set of all probable decryption keys are collectively termed as key space.
View solution
Q. ____________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is replaced by another letter in creating the cipher-text.
View solution
Q. _____________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.
View solution
Q. ________________ is a cipher formed out of substitution where for a given key-value the cipher alphabet for every plain text remains fixed all through the encryption procedure.
View solution
Q. In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.
View solution
Q. ______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text.
View solution
Q. The ________________ has piece of the keyword that has the same length as that of the plaintext.
View solution
Q. In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.
View solution
Q. In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!