
CRYPTOGRAPHY
Authored by Saranya K
Engineering
University
Used 23+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cryptography, what is cipher?
algorithm for performing encryption and decryption
encrypted message
both algorithm for performing encryption and decryption and encrypted message
decrypted message
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In asymmetric key cryptography, the private key is kept by __________
sender
receiver
sender and receiver
all the connected devices to the network
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following algorithm is not used in asymmetric-key cryptography?
rsa algorithm
diffie-hellman algorithm
electronic code book algorithm
dsa algorithm
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In cryptography, the order of the letters in a message is rearranged by __________
transpositional ciphers
substitution ciphers
both transpositional ciphers and substitution ciphers
quadratic ciphers
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is data encryption standard (DES)?
block cipher
stream cipher
bit cipher
byte cipher
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Cryptanalysis is used __________
to find some insecurity in a cryptographic scheme
to increase the speed
to encrypt the data
to make new ciphers
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is a cryptographic protocol used to secure HTTP connection?
stream control transmission protocol (SCTP)
transport layer security (TLS)
explicit congestion notification (ECN)
resource reservation protocol
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?