adplus-dvertising
frame-decoration

Question

Which of the following is not the primary objective of cryptography?

a.

Confidentiality

b.

Data Integrity

c.

Data Redundancy

d.

Authentication

Posted under Cyber Security

Answer: (c).Data Redundancy

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the following is not the primary objective of cryptography?

Similar Questions

Discover Related MCQs

Q. Cryptography offers a set of required security services. Which of the following is not among that 4 required security services?

Q. A cryptosystem is also termed as ______________

Q. ______________ is the mathematical procedure or algorithm which produces a cipher-text for any specified plaintext.

Q. _______________ takes the plain text and the key as input for creating cipher-text.

Q. ____________________ is a mathematical algorithm that produces a unique plain text for a given cipher text along with a decryption key.

Q. A set of all probable decryption keys are collectively termed as ____________

Q. Encryption-decryption in cryptosystem is done in ______ ways.

Q. In _____________________ same keys are implemented for encrypting as well as decrypting the information.

Q. In __________________ 2 different keys are implemented for encrypting as well as decrypting that particular information.

Q. A set of all probable decryption keys are collectively termed as key space.

Q. ____________ is a mono-alphabetic encryption code wherein each & every letter of plain-text is replaced by another letter in creating the cipher-text.

Q. _____________ is the concept that tells us about the replacement of every alphabet by another alphabet and the entire series gets ‘shifted’ by some fixed quantity.

Q. ________________ is a cipher formed out of substitution where for a given key-value the cipher alphabet for every plain text remains fixed all through the encryption procedure.

Q. In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.

Q. ______________ employs a text string as a key that is implemented to do a series of shifts on the plain-text.

Q. The ________________ has piece of the keyword that has the same length as that of the plaintext.

Q. In _____________ a sequence of actions is carried out on this block after a block of plain-text bits is chosen for generating a block of cipher-text bits.

Q. In _______________ the plain-text is processed 1-bit at a time & a series of actions is carried out on it for generating one bit of cipher-text.

Q. The procedure to add bits to the last block is termed as _________________

Q. Which of the following is not an example of a block cipher?