hello! i need to resolve the multiple choices in network security Q1. In which o
ID: 1840361 • Letter: H
Question
hello!
i need to resolve the multiple choices in network security
Q1. In which of the following encryption techniques the “Secret Key” is shared?
A. Asymmetric
B. Shared Key
C. Symmetric
D. All of them
Q2. In Play Fair Cipher technique what type of matrix is created?
3X3, ignore letter ‘B’
4X4, ignore letter ‘x”
5x5, ignore letter ‘x’
5x5, ignore letter ‘j’
Q3. On which of the following does XOR Operation work?
Binary
B. ASCII.
C. Alphabet
D. Prime Numbers
Q4. How Many rounds will happen in AES encryption if it’s a 128 bit key?
5
9
10
14
Q5. In RSA encryption the data is encrypted using which key?
Public Key
Private Key
Shared Key
No key is needed
Q1. In which of the following encryption techniques the “Secret Key” is shared?
A. Asymmetric
B. Shared Key
C. Symmetric
D. All of them
Q2. In Play Fair Cipher technique what type of matrix is created?
3X3, ignore letter ‘B’
4X4, ignore letter ‘x”
5x5, ignore letter ‘x’
5x5, ignore letter ‘j’
Q3. On which of the following does XOR Operation work?
Binary
B. ASCII.
C. Alphabet
D. Prime Numbers
Q4. How Many rounds will happen in AES encryption if it’s a 128 bit key?
5
9
10
14
Q5. In RSA encryption the data is encrypted using which key?
Public Key
Private Key
Shared Key
No key is needed
Explanation / Answer
1) Shared Key is used to share Secret Key
2)5*5 Matrix ignore letter j
j is associated with i
3) XOR operation works with Binary Numbers
4) 10 Rounds for 128bit key
12 Rounds for 192 bit key
14 Rounds for 256 bit key
5)
RSA encryption the data is encrypted by using Public Key
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.