Crypto
Crypto
-
False
2. Which among the following are steps in each round of AES algorithm? - Substitute
Bytes
9. Select the modes in which computations do not depend on outputs from previous
stages - Electronic Code Book
11. Which among the following is the most resistant to frequency analysis? - Random
polyalphabetic
13. Based on the network security protocols, which of the following algorithms are
used to generate message digests? - MD5
14. Which among the following algorithms is designed based on the Feistel Cipher? -
DES
15. In which of the following modes, transmission errors are not propagated? -
Output Feedback Mode
21.Which among the following is the most desirable property to enhance the
computational complexity of cryptosystems?
Complexity of the algorithm-wrong, Number of keys-wrong
24.What is the size of the hash value produced by the MD5 algorithm
128 bits