frequently tested questions/all possible questions with
complete solution
What term from the list below best describes a data concealment for covert
communication that makes use of LSB replacement?
-Crypanalysis
-Stegnalysis
-Steganography
-Whitening
Steganography
Which block cipher below uses a block size of 128 bits and key sizes up to 256
bits?
-DES
-Blowfish
-TwoFish
-Tiger
TwoFish
Symmetric encryptionm is expressed mathematically as :
- C=E(k,p)
- P= E(k,c)
- Me % n
- y^2 = x^3 + Ax +B
C = E (k,p)
Name all the Hashing algorithms
- Tiger
- SHA256
- Fork256
- SHA1
- Gost
- MD5
- RIPEMD-160
What is the has value for TIGER?
192 bit
What is the hash value for SHA256?
128 Bit
What is the hash value for FORK 256?
128 bit
What is the hash value for SHA1?
160 Bit
What is the hash value of GOST?
256 bit
, What is the hash value of MD5?
128 Bit
What is the hash value of RIPEMD-160
160 bit
What are all they symmetric block ciphers?
- AES
- IDEA
- DES
- Blowfish
- TwoFish
- Skipjack
- Serpent
What is the block and key size for AES?
- 128 bit block
- 128, 192 and 256 bit key
What is the block and key size for DES?
- 64 bit block
- 56 bit key
What is the block and key size for IDEA?
- 64 bit block
- 128 bit key
What is the block and key size for Blowfish
- 64 bit block
- 32-448 bit key
What is the block and key size for TwoFish?
- 128 bit block size
- 1-256 bit key
What is the block and key size for SkipJack?
- 64 bit block
- 80 bit key
What is the block and key size for Serpent?
- 128 bit block size
- 128, 192 and 256 bit key sizes
Which of the following are asymmetric encryption algorithms?
- RSA
- MD5
- ECC
- RIPEMD-160
- IDEA
- AES
- DSA
- OFB
-RSA
-DSA
-ECC