Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

hello! i need to resolve the multiple choices in network security Q1. In which o

ID: 1840361 • Letter: H

Question

hello!

i need  to resolve the multiple choices in network security

Q1. In which of the following encryption techniques the “Secret Key” is shared?

A. Asymmetric

B. Shared Key

C. Symmetric

D. All of them

Q2. In Play Fair Cipher technique what type of matrix is created?

3X3, ignore letter ‘B’

4X4, ignore letter ‘x”

5x5, ignore letter ‘x’

5x5, ignore letter ‘j’

Q3. On which of the following does XOR Operation work?

Binary                                     

B. ASCII.                

C. Alphabet             

D. Prime Numbers

Q4. How Many rounds will happen in AES encryption if it’s a 128 bit key?

5

9

10

14

Q5. In RSA encryption the data is encrypted using which key?

Public Key

Private Key

Shared Key

No key is needed

Q1. In which of the following encryption techniques the “Secret Key” is shared?

A. Asymmetric

B. Shared Key

C. Symmetric

D. All of them

Q2. In Play Fair Cipher technique what type of matrix is created?

3X3, ignore letter ‘B’

4X4, ignore letter ‘x”

5x5, ignore letter ‘x’

5x5, ignore letter ‘j’

Q3. On which of the following does XOR Operation work?

Binary                                     

B. ASCII.                

C. Alphabet             

D. Prime Numbers

Q4. How Many rounds will happen in AES encryption if it’s a 128 bit key?

5

9

10

14

Q5. In RSA encryption the data is encrypted using which key?

Public Key

Private Key

Shared Key

No key is needed

Explanation / Answer

1) Shared Key is used to share Secret Key

2)5*5 Matrix ignore letter j

j is associated with i

3) XOR operation works with Binary Numbers

4) 10 Rounds for 128bit key

12 Rounds for 192 bit key

14 Rounds for 256 bit key

5)

RSA encryption the data is encrypted by using Public Key