hello i need to resolve the multiple choices in network secu

hello!

i need  to resolve the multiple choices in network security

Q1. In which of the following encryption techniques the “Secret Key” is shared?

A. Asymmetric

B. Shared Key

C. Symmetric

D. All of them

Q2. In Play Fair Cipher technique what type of matrix is created?

3X3, ignore letter ‘B’

4X4, ignore letter ‘x”

5x5, ignore letter ‘x’

5x5, ignore letter ‘j’

Q3. On which of the following does XOR Operation work?

Binary                                     

B. ASCII.                

C. Alphabet             

D. Prime Numbers

Q4. How Many rounds will happen in AES encryption if it’s a 128 bit key?

5

9

10

14

Q5. In RSA encryption the data is encrypted using which key?

Public Key

Private Key

Shared Key

No key is needed

Q1. In which of the following encryption techniques the “Secret Key” is shared?

A. Asymmetric

B. Shared Key

C. Symmetric

D. All of them

Q2. In Play Fair Cipher technique what type of matrix is created?

3X3, ignore letter ‘B’

4X4, ignore letter ‘x”

5x5, ignore letter ‘x’

5x5, ignore letter ‘j’

Q3. On which of the following does XOR Operation work?

Binary                                     

B. ASCII.                

C. Alphabet             

D. Prime Numbers

Q4. How Many rounds will happen in AES encryption if it’s a 128 bit key?

5

9

10

14

Q5. In RSA encryption the data is encrypted using which key?

Public Key

Private Key

Shared Key

No key is needed

Solution

1) Shared Key is used to share Secret Key

2)5*5 Matrix ignore letter j

j is associated with i

3) XOR operation works with Binary Numbers

4) 10 Rounds for 128bit key

12 Rounds for 192 bit key

14 Rounds for 256 bit key

5)

RSA encryption the data is encrypted by using Public Key

hello! i need to resolve the multiple choices in network security Q1. In which of the following encryption techniques the “Secret Key” is shared? A. Asymmetric
hello! i need to resolve the multiple choices in network security Q1. In which of the following encryption techniques the “Secret Key” is shared? A. Asymmetric

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site