Bissoy
Login
Get Advice on Live Video Call
Earn $ Cash $ with
consultations on Bissoy App
A symmetric cipher system has an IC of 0.041. What is the length of the key ‘m’?
A
1
B
3
C
2
D
5
Correct Answer:
5
Using the formula for calculating ‘m’ we get m=5, where m≈0.027n/(I_c (n-1)-0.038n+0.065).
Public key encryption uses multiple keys.ne key is used to encrypt data, while another is used to decrypt data.he key used to encrypt data is called the _______ key, while the key used to decrypt data is called the ________ key.
A
encryption, decryption
B
private, public
C
encryption, public
D
public, private
A pulley is connected to a power transmission shaft of diameter d by means of a rectangular sunk key of width w and length l. The width of the key is taken as d/4. For full power transmission, the shearing strength of the key is equal to the torsional shearing strength of the shaft. The ratio of the length of the key to the diameter of the shaft (l/d) is
A
п/4
B
п/6
What will be the plain text corresponding to cipher text “SEDGKG” if beaufort cipher is used with key as “KEY”?
A
PRISON
B
DEATHS
C
SAVEUS
D
ABUSED
What will be the plain text corresponding to cipher text “XKS” if the bifid cipher is used with key as “KEY” and period as 5?
A
IND
B
USA
C
RSA
D
AUS
In Playfair cipher, at first, a key table is produced. That key table is a 5 by 5 grid of alphabets which operates as the key to encrypt the plaintext.
A
Rolling Cipher
B
Shift Cipher
C
Playfair Cipher
D
Block Cipher
Select the correct differences between char and varchar data types? i. varchar is non unicode and char is unicode character data type ii. char is ‘n’ bytes whereas varchar is actual length in bytes of data entered in terms of storage size iii. varchar is variable in length and char is the fixed length string iv. For varchar, if a string is less than the maximum length then it is stored in verbatim without any extra characters while for char if a string is less than the set length it is padded with extra characters to equalize its length to given length
A
i, iii, iv
B
ii, iii, iv
C
i, ii, iv
D
iii, iv
A private key and its mathematically related public key, which are so related that the public key, can verify a digital signature created by the private key, in an Asymmetric Crypto system means:
A
Key pair
B
Both keys
C
Soft keys
D
Soft pair
What will be the plain text corresponding to cipher text “EETPEG” if gronsfeld cipher is used with key “4321”?
A
ABACUS
B
ABROAD
C
ABRUPT
D
ABUSED
What will be the plain text corresponding to cipher text “SCEFJV” if gronsfeld cipher is used with key “1234”?
A
RABBIT
B
RUSSIA
C
RANGER
D
FRIEND
What will be the plain text corresponding to cipher text “SCSEMG” if rail fence cipher is used with key value 2?
A
MSGSEC
B
SECMSG
C
GSMSEC
D
SECGSM