Cryptography and Network Security

In brute force attack, on average half of all possible keys must be tried to achieve success.
A) True
B) False
If the sender and receiver use different keys, the system is referred to as conventional cipher system.
A) True
B) False
 
Divide (HAPPY)26 by (SAD)26. We get quotient –
A) KD
B) LD
C) JC
D) MC
Dividing (11001001) by (100111) gives remainder –
A) 11
B) 111
C) 101
D) 110
pi in terms of base 26 is
A) C.DRS
B) D.SQR
C) D.DRS
D) D.DSS
The time required to convert a k-bit integer to its representation in the base 10 in terms of big-O notation is
A) O(log2 n)
B) O(log n)
C) O(log2 2n)
D) O(2log n)
In base 26, multiplication of YES by NO gives –
A) THWOE
B) MPAHT
C) MPJNS
D) THWAE
Division of (131B6C3) base 16 by (lA2F) base 16 yeilds –
A) 1AD
B) DAD
C) BAD
D) 9AD
An encryption scheme is unconditionally secure if the ciphertext generated does not contain enough information to determine uniquely the corresponding plaintext, no matter how much cipher text is available.
A) True
B) False
 
The estimated computations required to crack a password of 6 characters from the 26 letter alphabet is-
A) 308915776
B) 11881376
C) 456976
D) 8031810176
{"name":"Cryptography and Network Security", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"In brute force attack, on average half of all possible keys must be tried to achieve success., If the sender and receiver use different keys, the system is referred to as conventional cipher system., Divide (HAPPY)26 by (SAD)26. We get quotient –","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker