Crypotography and network security

123456789101112131415
Across
  1. 3. How many round keys are generated in the AES algorithm
  2. 5. Which one of the following modes of operation in DES is used for operating short data
  3. 8. The property that there should be equally likely number of 1s and 0s in a Pseudo Random Number sequence is
  4. 9. Which of the following is a faulty S-AES step function?
  5. 11. Which is not a cryptographic algorithm
  6. 13. Which block mode limits the maximum throughput of the algorithm to the reciprocal of the time for one execution
  7. 14. How many modes of operation are there in DES and AES
  8. 15. Which among the following has the lowest bitrate
Down
  1. 1. The property that any extracted subsequence should pass the test for randomness is
  2. 2. Caesar Cipher is an example of
  3. 4. Which algorithm follows Feistel Cipher Structure
  4. 6. TRNGs take in an input which is referred to as
  5. 7. The product of monic polynomials is
  6. 10. With reference to stream ciphers, the output of the generator is called
  7. 12. Which of the following produces an output of fixed length