1.
If there are N people in the world and are using secret key encryption/decryption for privacy purpose, then number of secret keys required will be:
2.
An attacker sits between customer and Banker, and captures the information from thecustomer and retransmits to the banker by altering the information. This attack is called as ______.
3.
Which of the following encryption algorithms is based on the Fiestal struture?
4.
Using p = 3, q = 13, d = 7 and e = 3 in the RSA algorithm, what is the value of ciphertext for a plain text 5 ?
5.
An example of poly-alphabetic substitution is
6.
SHA-1 is a
7.
Advanced Encryption Standard (AES) is based on
8.
A public key encryption system
9.
The standard for certificates used on internet is