ICT
ARCHITECTURE OF 8085
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Encryption
|
|
Cryptography
|
|
Decryption
|
|
Ciphertext
|
|
Cryptanalysis
|
Detailed explanation-1: -Multivariate cryptography. Post-quantum cryptography. Quantum cryptography. Steganography. Visual cryptography.
Detailed explanation-2: -Types of cryptanalysis. There are three generic types of cryptanalysis, characterized by what the cryptanalyst knows: (1) ciphertext only, (2) known ciphertext/plaintext pairs, and (3) chosen plaintext or chosen ciphertext.
Detailed explanation-3: -Cryptology is the science of secure communications. Cryptography creates messages with hidden meaning; cryptanalysis is the science of breaking those encrypted messages to recover their meaning.
Detailed explanation-4: -Ciphertext-Only Attack. Known Plaintext Attack. Differential Cryptanalysis Attack. Man-in-the-Middle Attack. Integral Cryptanalysis Attack. Chosen Plaintext Attack. Side-Channel Attack. Dictionary Attack. 23-Feb-2023
Detailed explanation-5: -Hash functions. Symmetric-key algorithms. Asymmetric-key algorithms. Hash Functions. Symmetric-Key Algorithms for Encryption and Decryption. More items •27-Dec-2019