Explore topic-wise MCQs in Cryptography.

This section includes 3 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography knowledge and support exam preparation. Choose a topic below to get started.

1.

The blowfish algorithm s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes.

A. 4096
B. 4608
C. 4168
D. 4864
Answer» D. 4864
2.

A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other s public key for future a technique known as ____________

A. time stamping
B. polling
C. caching
D. squeezing
Answer» D. squeezing
3.

Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B s public key. In notation of X.509, the correct order of this chain is represented as

A. X2 X1 X1 B
B. X1 X1 X2 A
C. X1 X2 X2 B
D. X1 X2 X2 A
Answer» D. X1 X2 X2 A