Choose a topic to test your knowledge and improve your Electrical measurements skills
In digital communication, interaction between ______ is possible.
Some advantages of spread spectrum are
Processing gain is the ratio of message bandwidth to signal bandwidth.
Which is better for avoiding jamming?
Which is more bandwidth efficient?
Which is more simpler to implement?
Which uses orthogonal codes?
Which is more suitable when large number of transmitters are used?
CDMA rejects
Frequency planning is very essential in
CDMA uses
In public key cryptosystem _____ keys are used for encryption and decryption.
In public key cryptosystem which is kept as public?
In a trapdoor function, the functions are easy to go in
Pretty good privacy program is used for
PGP system uses
Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption.
Which are called the block ciphers?
Which has a key length of 128 bits?
Which algorithm can be used to sign a message?
Examples of hash functions are
A cryptographic hash function has variable output length.
A set of numbers is called as super increasing if
Knapsack problem can be solved by
Merkle hellman is a symmetric cryptosystem.
In this Merkle Hellman method same key is used for encryption and decryption.
Cipher system can be solved effectively by statistically using
Encryption transformations are known as
For n input bits the number of substitution patterns are
In transposition, the plaintext letters are
The substitution of the letters are done
In cipher feedback method, encryption is done on
In stream encryption, the key sequence repeats itself.
In which method, key-stream is generated independently?
Synchronous ciphers uses
Public key cryptosystem uses same key for both encryption and decryption.
Which should be kept as a secret in public key cryptosystem?
Public key cryptosystem is also known as
Euler’s totient function is determined by
Pretty good privacy (PGP) security system uses
Public key cryptosystem is used for the encryption of
For digital signatures private key cryptosystem is used.
Data compression includes
PGP offers _____ block ciphers for message encryption.
Which block cipher has key length of 128 bits?
These three ciphers can operate of ______ of plaintext and cipher text.
The key size of DES is
Which operation is used in encryption using IDEA?
What is the key size allowed in PGP?
Which algorithm is used for public key encryption?