Sis Prvi Kolokvijum Teorija

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Hanibani1823
H
Hanibani1823
Community Contributor
Quizzes Created: 1 | Total Attempts: 710
| Attempts: 710 | Pitanja: 123
Please wait...

Question 1 / 123
0 %
0/100
Score 0/100
1.  OTP šifra može da se koristi

Explanation

The correct answer is "samo jednom" which means "only once" in English. This suggests that the OTP (One-Time Password) code can be used for a single time only and cannot be reused or used multiple times. This is a common security measure to ensure that the password remains unique and cannot be compromised or intercepted by unauthorized individuals.

Submit
Please wait...
About This Quiz
Sis Prvi Kolokvijum Teorija - Quiz

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Prilikom kreiranja korisnickih naloga, na disk se smesta par korisnicko ime-hes lozinka?

Explanation

During the creation of user accounts, the username-password pair is stored on the disk.

Submit
3.  Vrhovni CA je potpisan od strane

Explanation

The correct answer is "Samog sebe". This means that the Supreme CA (Certification Authority) signs itself, indicating that it is its own authority and does not require validation or authorization from any other entity. This suggests that the Supreme CA has the highest level of trust and autonomy in issuing and managing digital certificates.

Submit
4. Koji je od sledecih formata najpogodniji za LSB supstituciju

Explanation

The BMP format is the most suitable for LSB (Least Significant Bit) substitution. This is because BMP files use a simple and uncompressed format, which makes it easier to manipulate individual bits without affecting the overall image quality. JPEG, TIG, and GIF formats, on the other hand, use compression techniques that can cause loss of data and introduce artifacts when modifying the least significant bits. Therefore, BMP is the preferred format for LSB substitution.

Submit
5. Sta se kod steganografije krije?

Explanation

The correct answer is "cinjenica da se prenosi poruka" which translates to "the fact that a message is being transmitted" in English. In steganography, the main purpose is to hide the existence of a message within a carrier medium. The answer suggests that what is being concealed in steganography is the fact that a message is being transmitted, rather than the actual content of the message itself. This highlights the covert nature of steganography, where the goal is to hide the communication rather than encrypting or protecting the content of the message.

Submit
6.  Jednosmerna heš funkcija generise otisak duzine 160 bitova.Koliko mogucih ulaznih poruka generise heš vrednosti 0000....0001?

Explanation

The given correct answer is "beskonacno mnogo". A hash function generates a fixed-length output regardless of the input size. In this case, the hash function generates a 160-bit output. Since the input message can vary in length, there are infinitely many possible input messages that can produce the same 160-bit hash value. Therefore, the hash function can generate an infinite number of input messages that result in the hash value "0000....0001".

Submit
7. Bezuslovno sigurna sifra

Explanation

The correct answer is "је OTP шифра". This is because OTP (One-Time Password) is a type of encryption where a unique password is generated for each authentication attempt. It provides a high level of security as the password is only valid for a single use or a short period of time. Therefore, OTP encryption is unconditionally secure and considered one of the most secure methods of encryption available.

Submit
8. Koje operacije se koriste kod OTP sifre

Explanation

The correct answer is "samo XOR" because OTP (One-Time Pad) encryption method uses only the XOR (exclusive OR) operation. In OTP, each character of the plaintext is combined with a character from a random key using XOR, resulting in the ciphertext. XOR is a bitwise operation that produces a 1 if the corresponding bits of the operands are different, and 0 if they are the same. This operation ensures that the encryption is secure, as long as the key is truly random and used only once.

Submit
9. Koliko parametara ima funkcija HMAC

Explanation

The correct answer is (M,K) because HMAC (Hash-based Message Authentication Code) is a cryptographic function that takes two parameters: the message (M) and the secret key (K). The function uses these parameters to generate a unique hash value that can be used to verify the integrity and authenticity of the message. The additional parameters in the other options are not necessary for the HMAC function.

Submit
10. Dodela prava autentifikovanom korisniku naziva se 

Explanation

The given answer is "autorizacija". This term refers to the process of granting rights or permissions to an authenticated user. It involves verifying the identity of the user and determining what actions or resources they are allowed to access. This process ensures that only authorized individuals can perform certain actions or access specific information within a system or application.

Submit
11. Tehnikom image downgrading-a

Explanation

The given answer states that it is possible to hide a BMP image within another BMP image. This means that one BMP image can be embedded or concealed within another BMP image without altering the file format. This technique is known as image downgrading, where one image is hidden within another to hide information or to achieve a certain effect.

Submit
12. Jednosmerna heš funkcija generiše otisak dužine 160 bitova. Koliko mogućih ulaznih poruka generiše heš vrednost 1?

Explanation

The given question asks how many possible input messages can generate a hash value of 1 using a one-way hash function that produces a 160-bit output. The correct answer is "beskonacno mnogo poruka" which means "infinitely many messages" in English. This is because hash functions are designed to have a high collision resistance, meaning that it is extremely unlikely for two different input messages to produce the same hash value. Therefore, there are an infinite number of possible input messages that can generate a hash value of 1.

Submit
13. Duzina blokova kod AES algoritma moze da bude

Explanation

The AES algorithm allows for block sizes of 128, 192, or 256 bits. These block sizes determine the amount of data that can be processed at once in the encryption or decryption process. The larger the block size, the more secure the algorithm can be, as it can handle larger amounts of data. However, larger block sizes also require more processing power and can slow down the encryption or decryption process. Therefore, the AES algorithm provides options for different block sizes to accommodate different security and performance needs.

Submit
14. Kod DES algoritma
Submit
15. Kod OTP šifre

Explanation

The correct answer is "Dužina ključa mora biti jednaka dužini poruke i upotrebljava se samo jednom." This means that the length of the key must be equal to the length of the message and it can only be used once. This ensures the security and confidentiality of the message by using a key that is unique to that specific message and cannot be reused.

Submit
16.  Trostruki DES :

Explanation

The correct answer is the option that states "Prvo šifruje sa prvim ključem, pa dešifruje sa drugim, pa šifruje sa prvim." This means that the encryption process starts by encrypting with the first key, then decrypting with the second key, and finally encrypting again with the first key. This sequence of encryption and decryption steps is known as triple DES (Data Encryption Standard) and provides enhanced security by applying multiple layers of encryption.

Submit
17. Koji algoritam ne pripada navedenoj grupi

Explanation

The correct answer is AES. AES (Advanced Encryption Standard) is a symmetric encryption algorithm, while the other options (SHA-3, MD5, and SHA-0) are all cryptographic hash functions.

Submit
18. Ukoliko se koristi engleski alfabet prosiren ciframa za kljuc duzine 18 koliki je prostor kljuceva?

Explanation

The question is asking for the size of the key space when using an extended English alphabet with digits for a key length of 18. The correct answer is (26 + 10) ^ 18. This is because there are 26 letters in the English alphabet and 10 digits, so the total number of characters is 26 + 10 = 36. To calculate the size of the key space, we raise this number to the power of the key length, which is 18. Therefore, the size of the key space is (26 + 10) ^ 18.

Submit
19. OTP je bezuslovno sigurna šifra

Explanation

The given correct answer is "Dokazano". This suggests that it has been proven or demonstrated that OTP (One-Time Password) is unconditionally secure. OTP is a type of password that is valid for only one login session or transaction, on a computer system or other digital device. It is considered highly secure because it is generated for each use and cannot be reused or intercepted by attackers. The use of OTP eliminates the risk of password theft or unauthorized access, making it a reliable and secure method of authentication.

Submit
20. Koja dva algoritama su po nacinu funkcionisanja slicni

Explanation

The correct answer is "jednostavni XOR i One Time Pad." Both algorithms use the XOR operation as a fundamental component in their encryption process. XOR is a bitwise operation that combines two binary numbers and produces a result based on their differences. In both jednostavni XOR and One Time Pad, XOR is used to combine the plaintext with a randomly generated key to create the ciphertext. This makes them similar in terms of their functioning.

Submit
21.  Frekvencijska analiza nema efekta na

Explanation

OTP stands for One-Time Pad, which is a cryptographic technique that uses a random key that is as long as the message being encrypted. This key is used only once and then discarded, making it impossible for anyone to decrypt the message without the key. Frequency analysis is a method used to break encryption by analyzing the frequency of letters or patterns in the encrypted message. However, since OTP uses a random key and each key is used only once, frequency analysis is ineffective against OTP encryption.

Submit
22. DES algoritam ima

Explanation

The correct answer is 16 rundi. The DES algorithm, which stands for Data Encryption Standard, consists of 16 rounds of encryption. Each round involves several operations, including permutation, substitution, and XOR operations, to transform the input data into the final encrypted output. These 16 rounds ensure a high level of security and make it difficult for unauthorized individuals to decrypt the encrypted data without the proper key.

Submit
23. Jednosmerne funkcije

Explanation

The correct answer is "nije dokazano ni da postoje ni da ne postoje." This means that it has not been proven whether one-way functions exist or not.

Submit
24. Slucajna  izmena sadrzaja poruke tokom prenosa

Explanation

The correct answer is "spada u narusavanje integriteta poruke" because it states that accidental modification of the message content during transmission is a violation of message integrity. This means that the message has been altered unintentionally, which can lead to the loss or corruption of data. The other options are not applicable because they either refer to intentional modifications, different detection mechanisms, or ignoring the issue altogether.

Submit
25. Servis  koji obezbedjuje proveru identiteta naziva se

Explanation

The correct answer is "autentifikacija" because it refers to the process of verifying the identity of a user or system. This service ensures that the claimed identity is valid and authorized, providing a secure way to access resources or information.

Submit
26.  Alisa zeli da posalje Bobu poruku m sifrovanu RSA algoritmom. Alisa sifruje poruku:

Explanation

Alisa wants to send a message to Bob using the RSA algorithm. The RSA algorithm involves the use of public and private keys. In this case, Alisa encrypts the message using Bob's public key. This is the correct answer because when using RSA encryption, the sender encrypts the message with the recipient's public key, ensuring that only the recipient with the corresponding private key can decrypt and read the message.

Submit
27. Sekvencijalni algoritmi se koriste

Explanation

Sequential algorithms are used in situations where speed and real-time processing are important, such as in larger cryptographic systems. They are not used in situations where it is important for the cipher to be transmitted without errors.

Submit
28. Ukoliko se koristi engleski alfabet prosiren ciframa i specijalnim znacima { +, -, *, /, =, ?, !, $ } za kljuc duzine 6 koliki je prostor kljuceva?

Explanation

The question asks for the size of the key space when using the English alphabet, extended digits, and special characters as the key. The correct answer is (26 + 10 + 12) ^ 6, which means that there are 48 possible characters (26 letters + 10 digits + 12 special characters) and the key length is 6. Thus, the key space is calculated by raising the number of possible characters to the power of the key length, resulting in a large number of possible keys.

Submit
29. Ukoliko se koristi engleski alfabet za kljuc duzine 26 koliki je prostor kljuceva ako slova mogu da se ponavljaju?

Explanation

The correct answer is 26 ^ 26. This is because there are 26 letters in the English alphabet and each letter can be used as a key. Since the letters can be repeated, there are 26 possibilities for each position in the key, resulting in a total of 26 raised to the power of 26 possible keys.

Submit
30. Ako je x = 01101, y = 01010 i z = 00111, koliko je (x XOR x XOR x XOR y XOR y XOR z XOR z XOR x XOR x XOR y XOR z) ?

Explanation

The XOR operation returns 1 if the two bits being compared are different, and 0 if they are the same. In this case, x XOR x will always be 0 because comparing the same bits will always result in 0. Therefore, the entire expression (x XOR x XOR x XOR y XOR y XOR z XOR z XOR x XOR x XOR y XOR z) simplifies to y XOR z. Since y = 01010 and z = 00111, the XOR operation between them will give us 00001. Therefore, the answer is 00001.

Submit
31. Kod blokovskih algoritama, blok sifrata se dobija visestrukom primenom odredjene funkcije na blok otvorenog teksta i medjurezultate. Jedna primena funkcije naziva se

Explanation

In the context of block cipher algorithms, a block cipher is obtained by repeatedly applying a specific function to a block of plaintext and intermediate results. Each application of the function is referred to as a "round".

Submit
32. Sigurnist DES algoritmima pociva na

Explanation

The security of DES algorithms is based on the use of s-boxes. S-boxes are substitution boxes that perform a nonlinear transformation on the input data, making it more resistant to cryptographic attacks. The use of s-boxes adds an extra layer of complexity and confusion to the encryption process, making it harder for an attacker to analyze and break the encryption. Therefore, the correct answer is "s-blokovima".

Submit
33. Postupak kojim se otvoreni tekst zapisuje u obliku binarnog niza naziva se

Explanation

The correct answer is "kodovanje". This is because the question is asking for the process of converting an open text into a binary sequence, which is called "kodovanje" in Serbian.

Submit
34. Aktivni napad koji onemogucava funkcionisanje sistema  ili pruzanje neke usluge je napad na

Explanation

The correct answer is "raspolozivost" which translates to "availability" in English. This means that the active attack that prevents the functioning of a system or the provision of a service is an attack on the availability of the system. In other words, the attacker aims to disrupt or deny access to the system or service, making it unavailable to users.

Submit
35. Prisluskivanje je napad na

Explanation

The correct answer is "poverljivost" which translates to "confidentiality" in English. This suggests that "prisluskivanje" refers to eavesdropping or wiretapping, which is considered an attack on confidentiality. Eavesdropping involves listening in on private conversations or intercepting communication without the knowledge or consent of the parties involved. This violation of privacy breaches the confidentiality of the information being exchanged, making it the target of such an attack.

Submit
36. Kod OTP sifre, duzina kljuca:

Explanation

The correct answer states that the length of the OTP (One-Time Password) key is the same as the length of the plaintext. This means that for every character in the plaintext, there is a corresponding character in the OTP key, making them equal in length. This is important because it ensures that the OTP key is long enough to provide sufficient security and randomness for encryption purposes.

Submit
37. Neka je Z skup znakova nad kojim se definise kljuc. Ukoliko je kljuc duzine 5 i Z={0,1,2,3,4...a,b,c...A,B,C...}, tada je velicina prostora kljuceva ukoliko slova u kljucu ne mogu da se ponavljaju

Explanation

The question asks for the size of the key space when the key length is 5 and the characters in the key cannot repeat. To calculate this, we need to find the number of possible choices for each character in the key.

Since there are 62 characters in the set Z, the first character of the key can be chosen in 62 ways. After choosing the first character, there are 61 characters left for the second character. Similarly, there are 60 choices for the third character, 59 choices for the fourth character, and 58 choices for the fifth character.

To find the total number of possible keys, we multiply these choices together, resulting in 62*61*60*59*58. Therefore, the correct answer is 62*61*60*59*58.

Submit
38. Za ECB i CBC rezime rada vazi:

Explanation

In ECB mode, the same block with the same key will always produce the same ciphertext. However, in CBC mode, this may not be the case. In CBC mode, each block of plaintext is XORed with the previous ciphertext block before encryption, which introduces randomness and makes the ciphertext different even if the same block and key are used. This makes CBC mode more secure than ECB mode, as it prevents patterns in the plaintext from being preserved in the ciphertext.

Submit
39. KOji od sledecih algoritama moze da se koristi za digitalno potpisivanje

Explanation

RSA is the correct answer because it is an algorithm that can be used for digital signing. RSA is a widely used asymmetric encryption algorithm that involves the use of a public key for encryption and a private key for decryption. It can also be used for digital signatures, where the sender uses their private key to sign a message, and the receiver can verify the authenticity of the message using the sender's public key. DES and AES are symmetric encryption algorithms, while Diffie-Hellman is a key exchange algorithm, none of which are specifically designed for digital signing.

Submit
40. Duzina otiska (hes vrednosti ) MD5 algoritma je

Explanation

The correct answer is 128bita. The MD5 algorithm generates a 128-bit hash value, which is commonly represented as a string of 32 hexadecimal characters. This hash value is used for various purposes such as data integrity checks and password storage.

Submit
41. Za siforvanje i digitalno potpisivanje koristi se

Explanation

The correct answer is "razliciti par kljuceva" which means "different pairs of keys" in English. This means that for encryption and digital signing, different pairs of keys are used. This is because encryption and digital signing require separate keys for different purposes. Using the same pair of keys for both encryption and digital signing could compromise the security of the system. Therefore, it is necessary to use different pairs of keys for these operations.

Submit
42. Hes funkcija se ne koristi za sifrovanje poruka jer je 

Explanation

The correct answer is "nemoguce je izvrsiti desifrovanje" which means "it is impossible to decrypt". This suggests that the function is not used for encryption because it cannot be reversed or decrypted.

Submit
43. Generator pseudoslucajnih vrednosti na osnovu kratkog slucajnog kljuca generise

Explanation

The generator pseudoslucajnih vrednosti (pseudo-random value generator) uses a short random key to generate a working key. This working key is likely to be used in various cryptographic algorithms or systems. The generator takes the short random key as input and applies a pseudo-random algorithm to generate the working key. This process allows for the generation of a secure and unpredictable working key, which is essential for ensuring the confidentiality and integrity of data in cryptographic operations.

Submit
44. Neporecivost je servis koji prijemnoj strani pruza neoboriv dokaz da:

Explanation

The correct answer states that "Neporecivost je servis koji prijemnoj strani pruza neoboriv dokaz da je poruku primio od tacno odredjene osobe" which means "Non-repudiation is a service that provides the receiving party with irrefutable evidence that the message was received from the exact specified person." This explanation clarifies that non-repudiation ensures that the sender cannot deny sending the message, providing a reliable proof of the sender's identity.

Submit
45. Duzina kljuca koji je potreban za izracunavanje HMAC vrednosti je

Explanation

The correct answer is "Manji od 64 bita". HMAC (Hash-based Message Authentication Code) is a cryptographic hash function that requires a key for calculating the HMAC value. In this case, the length of the key needed for HMAC calculation is smaller than 64 bits.

Submit
46. Simetrični algoritmi:

Explanation

Symmetric algorithms have a problem with key exchange. This means that both parties involved in the communication need to have the same key in order to encrypt and decrypt the data. The challenge lies in securely exchanging this key between the parties without it being intercepted by unauthorized entities. Asymmetric algorithms, on the other hand, do not have this problem as they use different keys for encryption and decryption.

Submit
47. Odrediti  red velicine broja operacija sifrovanja i desifrovanja na trostruki DES metodom susret u sredini

Explanation

The correct answer is 2^112. This is because the triple DES method uses a 112-bit key for encryption and decryption. The encryption and decryption processes each involve a series of operations, including permutation, substitution, and XOR operations. The size of the key determines the number of possible combinations, which is 2^112 in this case. Therefore, the correct answer represents the size of the key used in the triple DES method.

Submit
48. Kolizija kod heš funkcija označava pojavu da

Explanation

The explanation for the given correct answer is that collision in hash functions refers to the occurrence of two different messages producing the same hash value. This means that two distinct inputs can result in the same output hash value, which can lead to potential conflicts or issues in certain applications that rely on unique hash values for data integrity and identification.

Submit
49. Jedna od nepozeljnih osobina generatora pseudoslucajnih brojeva je

Explanation

Periodicnost je jedna od nepoželjnih osobina generatora pseudoslučajnih brojeva. Periodicnost se odnosi na ponavljanje istih brojeva u nizu generisanih brojeva. U slučaju generatora pseudoslučajnih brojeva, periodičnost može dovesti do predvidljivosti i smanjiti sigurnost sistema koji se oslanjaju na generisane brojeve. Stoga, periodičnost je neželjena osobina generatora pseudoslučajnih brojeva.

Submit
50. Kod CNC rezima rada blokovskih algoritama, evenutalna namerna ili slucajna promena bloka se automatski ispravlja nakom

Explanation

In CNC mode of operation for block algorithms, any intentional or accidental change in a block is automatically corrected after 2 blocks. This means that if there is a mistake or deviation in a block, the CNC system will detect it and make the necessary adjustments in the next two blocks to ensure the correct execution of the program. This feature helps to maintain accuracy and consistency in the machining process.

Submit
51. DES algoritam je

Explanation

The given correct answer states that DES algorithm is a "blokovski algoritam Fejstelovog tipa" which translates to "block cipher algorithm of the Feistel type" in English. This means that DES is a type of symmetric encryption algorithm that operates on fixed-size blocks of data using a Feistel network structure. It divides the input into blocks and applies a series of transformations to each block to produce the encrypted output. Therefore, the answer correctly identifies DES as a block cipher algorithm of the Feistel type.

Submit
52. Kod blokovskog algoritma, po pravilu

Explanation

The correct answer is "blok sifrata je iste duzine kao blok otvorenog teksta" because in block cipher algorithms, the length of the ciphertext block is the same as the length of the plaintext block. This means that each block of plaintext is encrypted into a block of ciphertext with the same length.

Submit
53. Zadatak savremenih algoritama sifrovanja:

Explanation

The correct answer states that the task of modern encryption algorithms is to transform bit sequences carrying information from the plaintext into a new binary sequence in such a way that unauthorized parties cannot access the information present in the plaintext through analysis of the ciphertext.

Submit
54. Za detekciju postojanja skrivenih poruka u steganoanalizi koristi se 

Explanation

In steganalysis, the process of detecting hidden messages, visual detection is used. This means that the detection is done through visual analysis of the carrier file or image. This method involves examining the pixels, color patterns, and any visual anomalies that may indicate the presence of hidden messages. By visually inspecting the steganographic carrier, one can identify any alterations or hidden information that may be present.

Submit
55. Blokovski algoritmi u jednom trenutku

Explanation

The correct answer is "deluje na sve bitove unutar bloka" (it operates on all bits within the block). This means that the algorithm affects every individual bit within the block of data being processed. It does not operate on a single byte of open text or encrypt byte by byte within each block. Instead, it considers and manipulates all the bits within the block as a whole.

Submit
56. Sifrarski sistem kod koga je vreme potrebno za razbijanje duze od vremena u kom informacija treba da bude tajna naziva se

Explanation

The correct answer is "racunski siguran." The question is asking for the name of a cipher system where the time required to break it is longer than the time it takes for the information to remain secret. "Racunski siguran" translates to "computationally secure," which means that it would take an infeasible amount of time and resources to break the cipher using computational methods.

Submit
57.  Ugradnjom podataka o vremenu slanja poruke u samu poruku

Explanation

By embedding the timestamp of the message in the message itself, it becomes possible to detect if the same message is being resent. This is because each time the message is sent, it will have a different timestamp, allowing for the detection of duplicate messages.

Submit
58. Tehnika kojom se u digitalni sadrzaj utiskuju dodatne informacije kao sto su podaci o autoru, vlasnistvu i slicno naziva se

Explanation

The given correct answer, "vodeni pecat," refers to the technique of embedding additional information such as authorship and ownership into digital content. This technique is commonly used to protect the intellectual property rights of the content and to provide attribution to the original creator. The term "vodeni pecat" translates to "watermark" in English, which is a commonly used term in the digital content industry.

Submit
59. Za hes funckije je vazno

Explanation

The correct answer is "da budu efikasne" (to be efficient). This is because efficiency is important for the function to perform well and achieve its intended purpose. Efficiency ensures that the function uses minimal resources, time, and effort to produce the desired outcome. It allows for optimal utilization of resources and maximizes productivity. Therefore, it is crucial for functions to be efficient in order to be effective and successful.

Submit
60. U Difi Helmanovom broj p koji se koristi za stepenovanje po modlu p tokom izracunavanja

Explanation

In the context of Diffie-Hellman key exchange, the prime number p used for modular exponentiation should be a large prime number. This is because using a large prime number enhances the security of the key exchange algorithm and makes it more difficult for attackers to calculate the shared secret key. The other options mentioned, such as any prime number, any large number, or the product of two large prime numbers, do not necessarily provide the same level of security as a large prime number.

Submit
61. Dati su parametri p=17 i q=5. Alisa i Bob razmenjuju kljuceve uz pomoc Difi Helmanovog algoritma. Alisa je zamislila broj 3, a Bob 7. Alisa salje Bobu: 

Explanation

In the given scenario, Alisa and Bob are using the Diffie-Hellman algorithm to exchange keys. Alisa chooses the number 3 and Bob chooses the number 7. They perform the calculations using the given parameters p=17 and q=5. The calculation 5 ^ 3(mod 17) means that Alisa raises 5 to the power of 3 and then takes the remainder when divided by 17. The result is 6. Therefore, the answer is 5 ^ 3(mod 17) = 6.

Submit
62. Sifrarski sistem kod koga je cena razbijanja sifrata prevazilazi vrednost sifrovane informacije naziva se

Explanation

In the given question, it is stated that the price of breaking the code exceeds the value of the encrypted information. This refers to a system called "racunski siguran" which translates to "computationally secure" in English. In such a system, the cost and effort required to decrypt the information are so high that it is not worth the value of the encrypted data. Therefore, "racunski siguran" is the correct answer.

Submit
63. ByteSub, ShiftRow,MaxColumn,AddRoundKey su operacije koje se vezuju za 

Explanation

The given correct answer is AES algorithm. ByteSub, ShiftRow, MaxColumn, and AddRoundKey are operations that are associated with the AES algorithm. AES (Advanced Encryption Standard) is a widely used symmetric encryption algorithm that is used to secure sensitive data. The ByteSub operation involves substituting each byte in the state matrix with a corresponding byte from the S-box. The ShiftRow operation involves shifting the rows of the state matrix. The MaxColumn operation involves selecting the maximum value from each column in the state matrix. The AddRoundKey operation involves XORing the state matrix with a round key. Together, these operations form the basis of the AES algorithm.

Submit
64. Izabrati tacno tvrdjenje

Explanation

The correct answer states that asymmetric algorithms are slower than symmetric algorithms. This means that when comparing the execution speeds of these two types of algorithms, asymmetric algorithms tend to be slower.

Submit
65. Da bi se uspesno desifrovao sifrat sifrovan sekvencijalnim sifarskim sistemom neophodno je da se poseduje

Explanation

In order to successfully decrypt a cipher using a sequential cipher system, it is necessary to possess both a random key and a pseudo-random number generator. The random key provides the initial starting point for the decryption process, while the pseudo-random number generator generates the sequence of numbers needed to decrypt the cipher. Having only one of these components (either the random key or the generator) would not be sufficient for successful decryption.

Submit
66.  Sigurnost kriptosistema počiva na

Explanation

The security of a cryptosystem relies on the secrecy of the decryption key. The encryption key is used to encrypt the message, but it is the decryption key that is needed to decrypt the message and retrieve the original information. If the decryption key is not kept secret, an attacker could potentially obtain it and easily decrypt the encrypted messages, compromising the security of the system. Therefore, the secrecy of the decryption key is crucial for the security of the cryptosystem.

Submit
67. Kada se informacija krije unutar video fajla uglavnom se koristi

Explanation

The correct answer is DCT metoda. DCT (Discrete Cosine Transform) is commonly used to hide information within a video file. It is a transformation technique that converts spatial information into frequency information, allowing for efficient compression and hiding of data. This method is widely used in video compression algorithms such as MPEG.

Submit
68. Sta je rezultat operacije ((a XOR b) XOR a) XOR (a XOR b)

Explanation

The result of the given operation is 'a' because XOR operation returns 1 if the number of 1's in the operands is odd, and 0 if it is even. In this case, since 'a' is 0 and 'b' is 1, the first XOR operation ((0 XOR 1) XOR 0) will result in 1. And the second XOR operation (0 XOR 1) will also result in 1. Therefore, the final XOR operation (1 XOR 1) will give the result as 0. Hence, the answer is 'a'.

Submit
69. Sta je rezultat operacije (((x XOR x) XOR y) XOR y) XOR x?

Explanation

The given expression (((x XOR x) XOR y) XOR y) XOR x simplifies to x because XOR operation with the same value on both sides results in 0, and XOR operation with 0 on one side and any value on the other side gives the same value. Therefore, since there are two XOR operations with x, they cancel each other out and the final result is x.

Submit
70. Digitalni potpis je servis koji treba da obezbedi 

Explanation

A digital signature is a service that aims to provide integrity and non-repudiation. This means that it ensures the data has not been tampered with and verifies the identity of the sender, preventing them from denying their involvement. The digital signature also ensures the authenticity of the message, confirming that it was indeed sent by the claimed sender.

Submit
71. Koji od navedenih algoritama je sekvencijalni 

Explanation

The given question asks for the sequential algorithm among the options provided. Out of the given options, AS/1 is the only algorithm that is sequential. Twofish, AES, and DES are all examples of symmetric key algorithms, but they are not specifically mentioned as sequential algorithms. Therefore, the correct answer is AS/1.

Submit
72. Simetricni kriptosistemi su oni

Explanation

The correct answer is "kod kojih je kljuc za sifrovanje i desirforvanje isti." This means that in symmetric cryptosystems, the key used for encryption is the same as the key used for decryption.

Submit
73. Sta je rezultat operacije ((a XOR b) XOR b) XOR (a XOR b) XOR 0

Explanation

The given expression ((a XOR b) XOR b) XOR (a XOR b) XOR 0 can be simplified using the properties of XOR operation. XOR of any number with itself gives 0, so (a XOR b) XOR b simplifies to a. Similarly, (a XOR b) XOR (a XOR b) simplifies to 0. Therefore, the entire expression reduces to a XOR 0, which is equal to a. Hence, the correct answer is a.

Submit
74. Sigurnost RSA algoritma lezi u

Explanation

The security of the RSA algorithm lies in the complexity of finding the prime factors of large numbers. This is because the RSA algorithm is based on the difficulty of factoring large composite numbers into their prime factors. The larger the prime factors, the more secure the RSA encryption becomes. Therefore, the complexity of finding prime factors of large numbers is crucial for the security of the RSA algorithm.

Submit
75. Da bi se smanjila dužina digitalnog potpisa poruke, računa se

Explanation

To reduce the length of a digital signature, the hash of the message is calculated and then digitally signed. This is because hashing algorithms can convert a message of any length into a fixed-length string of characters, which makes it more efficient to sign and verify the integrity of the message. By signing the hash of the message instead of the entire message, the digital signature becomes shorter and easier to handle.

Submit
76. Dati su parametri p=17 i q=11. Alisa i Bob razmenjuju kljuceve uz pomoc Difi Helmanovog algoritma. Alisa je zamislila broj 7, a Bob 9. Bob salje Alisi: 

Explanation

The given answer states that the result of calculating 11 raised to the power of 9, modulo 17 is 6. In the Diffie-Hellman algorithm, both Alice and Bob choose a private number and exchange their public keys. They then use each other's public keys and their own private keys to calculate a shared secret key. In this case, Bob's private key is 9 and Alice's public key is 11. Therefore, Bob calculates 11 raised to the power of 9, modulo 17, which results in 6.

Submit
77. Nedostatak ECB rezima je to sto

Explanation

The correct answer is "istim blokovima odgovaraju isti sifrati." This means that in ECB mode, the same plaintext block will always be encrypted into the same ciphertext block. This lack of randomness and variability in the encryption process can be a security weakness, as patterns in the plaintext can be easily observed in the ciphertext. This makes it easier for an attacker to analyze and potentially break the encryption.

Submit
78. Supstitucija kod koje se tokom sifrovanja jedan znak ne zamenjuje uvek istim znakom vec nekim iz dozvoljenog skupa znakova naziva se

Explanation

The correct answer is "polialfabetska." Polialfabetska substitution is a type of substitution cipher where one character is not always replaced by the same character but by a character from a permitted set of characters. This means that multiple substitutions can occur for the same character, increasing the complexity and security of the encryption.

Submit
79. Prednost sifrovanja hes vrednosti (prilikom autentifikacije i provere integriteta) asimetricnim algoritmom u odnosu na sifrovanje simetricnim algoritmom je to sto

Explanation

The advantage of encrypting hash values (during authentication and integrity verification) with an asymmetric algorithm compared to symmetric algorithm is that there is no need for internal trust. This means that there is no requirement for a trusted party or entity to ensure the security and integrity of the process. Asymmetric encryption allows for verification without relying on a central authority or internal trust, providing a more decentralized and potentially more secure solution.

Submit
80. Alisa i Bob razmenjuju zajednicku tajnu koristeci Difi Helmanov algoritam. Alisa salje Bobu vrednost g ^ a(mod p), a Bob Alisi g ^ b(mod p). Izabrati javne komponente ove komunikacije:

Explanation

The question is asking to select the public components of the Diffie-Hellman key exchange between Alisa and Bob. In the Diffie-Hellman algorithm, p represents a large prime number, g is a primitive root modulo p, a and b are private exponents chosen by Alisa and Bob respectively. The public components that can be shared are p (the prime number), g ^ a (Alisa's calculated value), g (the primitive root modulo p), and g ^ b (Bob's calculated value). These public components allow both parties to compute the shared secret key.

Submit
81. Serifikaciono telo CA potvrdjuje valdinost javnih kljuceva sertifikatom koji 

Explanation

The correct answer is "CA potpisuje svojim tajnim kljucem." This means that the Certification Authority (CA) confirms the validity of public keys by signing them with its private key. This ensures the authenticity and integrity of the public keys, as only the CA possesses the private key necessary to sign the certificates.

Submit
82. Heš funkcija je 

Explanation

The correct answer is a one-way function that takes an input of arbitrary finite size and produces an output of fixed length. This means that the function is deterministic, meaning that given the same input, it will always produce the same output. Additionally, it is computationally infeasible to reverse-engineer the original input from the output, making it a one-way function. The fact that the output has a fixed length ensures that the function will always produce an output of the same size, regardless of the input size.

Submit
83. Funkicje koje relativno lako mogu da se izracunaju ali njihova inverzna vrednost moze da se lako odredi samo izuzetno slozenim postupkom nazivaju se

Explanation

The given question is in Serbian language and it translates to "Functions that can be relatively easily calculated but their inverse value can be determined only by an extremely complex procedure are called one-way functions." Therefore, the correct answer is "one-way functions".

Submit
84. DOS je napad na 

Explanation

DOS (Denial of Service) je napad koji ima za cilj onesposobiti ili ometati pristup određenom resursu ili usluzi. Napad na raspoloživost znači da se napadač fokusira na preopterećenje ili onesposobljavanje mrežnih ili računalnih resursa kako bi onemogućio njihovu normalnu upotrebu. To može uključivati ​​preplavljivanje mreže ili poslužitelja velikim brojem zahtjeva ili korištenje drugih metoda za iscrpljivanje resursa. Napad na raspoloživost može rezultirati nedostupnošću usluga za legitimne korisnike.

Submit
85. Za digitalno potpisivanje koriste se

Explanation

Asimetricni kriptografski sistemi se koriste za digitalno potpisivanje. Ovi sistemi koriste dva ključa, javni i privatni, koji su međusobno povezani. Javni ključ se koristi za enkripciju podataka, dok se privatni ključ koristi za dekripciju. Kada se koristi za digitalno potpisivanje, privatni ključ se koristi za potpisivanje poruke, dok se javni ključ koristi za verifikaciju potpisa. Ova tehnika omogućava sigurnu razmenu informacija i potvrdu identiteta pošiljaoca.

Submit
86. Difi Helmanov algoritam se koristi za

Explanation

The correct answer is "Razmenu simetričnih ključeva" which translates to "Exchange of symmetric keys" in English. The Diffie-Hellman algorithm is used for securely exchanging symmetric keys between two parties over an insecure channel. It allows the two parties to agree on a shared secret key without actually transmitting the key itself. This shared key can then be used for symmetric encryption and decryption of messages between the parties.

Submit
87. Skup aktivnosti koje treba da se obezbede da neovlascena strana u komunikaciji ne dodje do poverljivih informacija  naziva se

Explanation

The correct answer is "poverljivost." Poverljivost refers to the set of activities that need to be ensured in order to prevent unauthorized parties from accessing confidential information in communication. It involves safeguarding sensitive data and restricting access to authorized individuals only.

Submit
88. Sifrarski sistem ako ne moze da bude razbijen ni uz primenu neogranicenih resursa ljudstva i vremena je

Explanation

The given statement states that if a cipher system cannot be broken even with unlimited resources of manpower and time, then it is unconditionally secure. This means that the system is completely secure and cannot be decrypted or compromised by any means, ensuring the confidentiality and integrity of the information.

Submit
89. U klasifikaciji steganografskih  tehnika kompjuterska steganografija spada u

Explanation

In the given question, the correct answer is "tehnicku steganografiju". This is because the question asks about the classification of steganographic techniques, and "tehnicka steganografija" is a specific type of steganography that involves hiding information within technical elements or aspects of a computer system. It is different from other options such as "resetkasti kod" (grid code), "bezsifrarne tehnike" (unencrypted techniques), and "semagrame" (semagrams), which do not specifically refer to steganography techniques.

Submit
90. AES moze da ima 

Explanation

The AES (Advanced Encryption Standard) can have 10, 12, or 14 rounds. The number of rounds in AES determines the level of security and encryption strength. The more rounds, the more secure the encryption, but also the slower the encryption process. The choice of the number of rounds depends on the specific security requirements and performance considerations of the application using AES.

Submit
91. Da li Hes funkcija treba da poseduje svojstvo lavinskog efekta?

Explanation

The correct answer is "pozeljno je". In this context, "pozeljno je" means "it is desirable". Therefore, the explanation for this answer is that the Hes function should possess the property of the avalanche effect.

Submit
92. Ukoliko se koristi engleski alfabet za kljuc duzine 4, koliki je prostor kljuceva ako slova ne mogu da se ponavljaju?

Explanation

The question asks for the number of possible keys when using the English alphabet as a key of length 4, without repeating any letters. The correct answer is 26 * 25 * 24 * 23, which represents the number of choices for each position in the key. Since there are 26 letters in the English alphabet, there are 26 choices for the first position, 25 choices for the second position (excluding the letter already chosen), 24 choices for the third position, and 23 choices for the fourth position. Multiplying these choices together gives us the total number of possible keys.

Submit
93. MAC se dobija tako sto

Explanation

The correct answer is "poruka se sifruje blokovskim algoritmom a zatim se pamti samo poslednji blok sifrata." This means that the message is encrypted using a block cipher algorithm, and only the last block of the ciphertext is stored. This method of obtaining a MAC ensures that the integrity of the message is maintained, as any modifications to the message will result in a different MAC value. Storing only the last block of the ciphertext helps to save memory and storage space.

Submit
94. Nedostatak OTP sifre je to

Explanation

The answer states that the key must be a random bit sequence and should not be transmitted through an insecure channel, which means that the other party needs to generate the same random bit sequence for decryption, which is impossible. Additionally, the process of generating a large amount of random binary sequences that have the properties of randomness is slow and can only be used once. The basic requirement for the key to be a completely random bit sequence is technically infeasible.

Submit
95. Da li se asimetricni kriptografski algoritmi cesto koriste za sifrovanje veoma poverljivih podataka?

Explanation

Asimetricni kriptografski algoritmi se ne često koriste za šifrovanje veoma poverljivih podataka. Ovi algoritmi koriste javni i privatni ključ za enkripciju i dekripciju podataka. Javni ključ je dostupan svima, dok je privatni ključ tajna informacija koja se koristi za dekripciju. Asimetrična kriptografija je sporija i zahteva više resursa od simetrične kriptografije, zbog čega se često koristi samo za razmenu ključeva ili digitalno potpisivanje. Za šifrovanje veoma poverljivih podataka se obično koristi simetrična kriptografija, koja je brža i efikasnija.

Submit
96. Fejstelova sifra  (mreza) predstavlja 

Explanation

The correct answer is "jedno idejno resenje blokovske sifre." This means that the Fejstel cipher (network) represents one conceptual solution of a block cipher. A block cipher is a type of encryption algorithm that operates on fixed-size blocks of data. The Fejstel cipher is a specific design of a block cipher that uses multiple rounds of substitution and permutation operations to encrypt and decrypt data. This answer correctly identifies the Fejstel cipher as a conceptual solution for a block cipher.

Submit
97.  Odrediti redosled koraka kod izbora tajnog i javnog ključa RSA algoritmom
Submit
98. Aktivan napad kojim se neovlašćeno menjaju podaci, pristupna prava ili način funkcionisanja sistema je napad na:

Explanation

This question is asking about the type of attack that involves unauthorized changes to data, access rights, or the functioning of a system. The correct answer is "Integritet." In the context of computer security, integrity refers to the accuracy, consistency, and trustworthiness of data. An attack on integrity would involve tampering with or modifying data in a way that compromises its reliability or validity.

Submit
99. Algoritam koji prilikom sifrovanja obradjuje blokove otvorenog teksta naziva se

Explanation

The correct answer is "blokovski algoritam." This is because the question asks for the name of the algorithm that processes blocks of plaintext during encryption. "Blokovski algoritam" translates to "block algorithm" in English, which accurately describes the process of encrypting data in blocks rather than as a whole.

Submit
100. Autentifikacija koja se realizuje siforvanjem hes vrednosti simetricnim algoritmom koristi

Explanation

The correct answer is "postojanje internog poverenja." This means that the authentication process that uses encryption of hash values with a symmetric algorithm relies on the existence of internal trust within the system. In other words, the authentication mechanism assumes that there is a level of trust within the system itself, allowing for secure communication. This trust can be established through various means, such as through the use of trusted certificates or secure channels.

Submit
101. Supstitucija kod koje je osnovni element vrsenje supstitucije grupa znakova naziva se

Explanation

The correct answer is "poligramska." The explanation for this answer is that "poligramska" refers to the substitution cipher where the basic element is the substitution of groups of characters. In this type of cipher, groups of characters are replaced with other groups of characters according to a specific rule or key. This technique is commonly used in cryptography to encrypt and decrypt messages.

Submit
102. AES algoritam je 

Explanation

The correct answer is "iterativni blokovski algoritam". The explanation is that the AES algorithm is an iterative block cipher algorithm. It operates on fixed-size blocks of data and uses multiple rounds of encryption to transform the input data into ciphertext. Each round consists of several operations, including substitution, permutation, and mixing of the data. This iterative process increases the security of the algorithm and makes it resistant to various cryptographic attacks.

Submit
103. Linearni pomeracki registri

Explanation

Linear shift registers are used as building blocks for more complex generators. They are not a complete solution for generating a random sequence of numbers, but rather a component that is used in combination with other elements to create more sophisticated generators.

Submit
104. Staticka detekcija je metoda koja se koristi 

Explanation

Staticka detekcija je metoda koja se koristi za postojanje skrivenih poruka u steganoanalizi.

Submit
105. Osnovna primena hes funkcije je 

Explanation

The correct answer is "u postupku autentifikacije" (in the authentication process). The explanation for this is that the primary use of a hash function is in the authentication process. Hash functions are commonly used to verify the integrity of data and ensure that it has not been tampered with during transmission or storage. In the context of authentication, hash functions are used to create a unique identifier for a piece of data, such as a password, and compare it with the stored hash value to verify the authenticity of the user.

Submit
106. ECB (Electronic Codebook Mode)

Explanation

ECB (Electronic Codebook Mode) encrypts each block of plaintext separately using the same key K. It does not depend on the previous blocks or their ciphertexts for encryption. Each block of plaintext is encrypted by performing an XOR operation between that block and the ciphertext of the previous block. To encrypt a block of plaintext, a subkey is generated from the previous block's subkey and the previous block of plaintext.

Submit
107. Svojstvo sifrarskih algoritama tako da su kod napada potpunom pretragom  kljuceva svi kljucevi podjednako verovatni naziva se

Explanation

The given correct answer states that the property of cryptographic algorithms where all keys are equally probable during a brute force attack is called the property of confusion. This means that the algorithm should provide a level of complexity and randomness in the relationship between the key and the cipher text, making it difficult for an attacker to determine the key through exhaustive search. The confusion property adds an additional layer of security by making it harder for an attacker to derive meaningful information from the cipher text without knowing the correct key.

Submit
108. Skup aktivnosti koje treba da sprece ili detektuju neovlascenu izmenu ili birsanje podataka bilo da se podaci cuvaju ili prenose oznacava se kao 

Explanation

Integritet podataka se odnosi na skup aktivnosti koje se preduzimaju kako bi se sprečila ili detektovala neovlašćena izmena ili brisanje podataka, bez obzira na to da li se podaci čuvaju ili prenose. Ovo je važno kako bi se osiguralo da podaci ostanu tačni, celoviti i nepromenjeni tokom svog životnog ciklusa. Integritet podataka je ključan za održavanje pouzdanosti i kvaliteta podataka.

Submit
109. Supstitucija kod koje se jedan znak zamenjuje uvek istim znakom naziva se

Explanation

The given correct answer is "monoalfabetska". This is because the question is asking for the name of the substitution in which one character is always replaced by the same character. "Monoalfabetska" refers to a substitution cipher where each letter of the plaintext is consistently replaced by a corresponding letter from a fixed alphabet.

Submit
110. Sertifikat sluzi za 

Explanation

The correct answer is "potvrdu vlasnistva nad javnim kljucem" which translates to "confirmation of ownership of the public key" in English. A certificate is used to verify the ownership of a public key, ensuring that the key belongs to the intended owner and has not been tampered with. It is commonly used in authentication processes to establish trust between parties in a secure communication environment.

Submit
111. Kriptografski sistem koji koristeci sistem sa javnim kljucem za razmenu simetricnog kljuca a potom prelazi na simetricnu kriptografiju naziva se

Explanation

A cryptographic system that uses a public key system for exchanging a symmetric key and then switches to symmetric cryptography is called a hybrid system. In this system, the public key encryption is used to securely exchange a symmetric key, which is then used for the actual encryption and decryption of the data. This combination of both asymmetric and symmetric cryptography provides the benefits of both systems - the secure key exchange of asymmetric encryption and the efficiency of symmetric encryption for bulk data encryption.

Submit
112. Algoritam koji elemente otvorenog teksta obradjuju jedan po jedan naziva se 

Explanation

The given correct answer is "sekvencijalni algoritam". This is because the question asks for the name of an algorithm that processes the elements of an open text one by one. "Sekvencijalni algoritam" translates to "sequential algorithm" in English, which accurately describes the process of sequentially processing the elements of the open text.

Submit
113. Spoji tacno
Submit
114. Koje su od navedenih sifri polialfabetske

Explanation

The correct answer is "Viznerova" because the Vigenère cipher, also known as the Vigenère-Vernam cipher or Viznerova šifra in Croatian, is a polyalphabetic substitution cipher that uses a series of different Caesar ciphers based on the letters of a keyword. This means that different letters in the plaintext will be shifted by different amounts, making it more secure than a simple Caesar cipher. The other options listed, Afina, Cezarova, and Hilova, do not refer to known polyalphabetic ciphers.

Submit
115. MAC moze da se koristi u procesu 

Explanation

MAC (Message Authentication Code) može da se koristi u procesu provere integriteta. Verifikuje se da li je poruka bila izmenjena tokom prenosa tako što se generiše i šalje kod koji se zasniva na sadržaju poruke i tajnom ključu. Primalac zatim generiše isti kod koristeći primljenu poruku i tajni ključ i upoređuje ga sa primljenim kodom. Ako se poklapaju, to znači da poruka nije bila izmenjena i integritet je potvrđen.

Submit
116. CB(chiper block chaining)

Explanation

The explanation for the given answer is that in CB (Cipher Block Chaining), each block of plaintext is encrypted by performing an XOR operation between that block and the ciphertext of the previous block. This ensures that each block is dependent on the previous block, adding an extra layer of security to the encryption process.

Submit
117. Aktivan napad kojim se neovlasceno menjaju podaci pristupna prava ili nacin funkcionisanja sistema je napad na 

Explanation

This answer is correct because the given statement describes an active attack where unauthorized changes are made to access rights or the functioning of a system. Such an attack compromises the integrity of the data, as it manipulates or alters the data in an unauthorized manner, potentially leading to loss or corruption of information.

Submit
118.  Pseudo slučajan niz brojeva se koristi

Explanation

A pseudo-random number sequence is used as a key for sequential cipher systems.

Submit
119. Koje su sifre od navedenih poligramske

Explanation

The correct answer is Vernamova and Hilova. The question is asking for the ciphers among the given options. Vernamova refers to the Vernam cipher, also known as the one-time pad, which is a symmetric encryption algorithm. Hilova refers to the Hill cipher, which is a polygraphic substitution cipher. Afin and Cezareva are not ciphers, so they are not the correct answers.

Submit
120. Supstitucija kod koje se vecina znakova menja istim sem onih najfrekventnijih koji mogu da se menjaju na vise nacina naziva se

Explanation

The given correct answer is "supstitucija homofona". This term refers to a substitution in which most of the characters are replaced with the same ones, except for the most frequent ones, which can be replaced in multiple ways. In other words, it is a type of substitution where the majority of characters are changed in a consistent manner, except for the most common characters that can be substituted in various ways.

Submit
121. Koja od navedenih sifri je monoalfabetska

Explanation

The correct answer is Afina, Cezarova, and Prosta supstitucija. These three codes are examples of monoalphabetic ciphers, where each letter in the plaintext is consistently replaced by a corresponding letter in the ciphertext. In Afina cipher, a letter is shifted by a certain number of positions in the alphabet. Cezarova cipher is a specific type of Afina cipher where the shift is always by three positions. Prosta supstitucija cipher involves substituting each letter with a different letter from the alphabet. Hilova cipher, on the other hand, is not a monoalphabetic cipher as it uses a different substitution for each occurrence of a letter.

Submit
122. Koje su od navedenih sifri poligramske

Explanation

The correct answer is "Hilova, Plejferova." These are the names of different types of polygraphic ciphers. "Hilova" refers to the Hill cipher, a polygraphic substitution cipher that uses linear algebra to encrypt and decrypt messages. "Plejferova" refers to the Playfair cipher, another type of polygraphic substitution cipher that uses a 5x5 grid of letters to encrypt and decrypt messages.

Submit
123. Ako posiljalac sifruje poruku javnim kljucem primaoca i takav sifrat posalje primaocu sta je nedostatak takve komunikacije

Explanation

The correct answer is "autorizacija". When the sender encrypts a message with the recipient's public key and sends such a ciphertext to the recipient, the lack of authorization is the drawback of such communication. This means that anyone who has the recipient's public key can encrypt a message and send it to the recipient, without any verification or permission. This lack of authorization can lead to unauthorized access and potential security breaches in the communication process.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 25, 2017
    Quiz Created by
    Hanibani1823
Cancel
  • All
    All (123)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
 OTP šifra može da se koristi
Prilikom kreiranja korisnickih naloga, na disk se smesta par...
 Vrhovni CA je potpisan od strane
Koji je od sledecih formata najpogodniji za LSB supstituciju
Sta se kod steganografije krije?
 Jednosmerna heš funkcija generise otisak duzine 160...
Bezuslovno sigurna sifra
Koje operacije se koriste kod OTP sifre
Koliko parametara ima funkcija HMAC
Dodela prava autentifikovanom korisniku naziva se 
Tehnikom image downgrading-a
Jednosmerna heš funkcija generiše otisak dužine 160...
Duzina blokova kod AES algoritma moze da bude
Kod DES algoritma
Kod OTP šifre
 Trostruki DES :
Koji algoritam ne pripada navedenoj grupi
Ukoliko se koristi engleski alfabet prosiren ciframa za kljuc duzine...
OTP je bezuslovno sigurna šifra
Koja dva algoritama su po nacinu funkcionisanja slicni
 Frekvencijska analiza nema efekta na
DES algoritam ima
Jednosmerne funkcije
Slucajna  izmena sadrzaja poruke tokom prenosa
Servis  koji obezbedjuje proveru identiteta naziva se
 Alisa zeli da posalje Bobu poruku m sifrovanu RSA algoritmom....
Sekvencijalni algoritmi se koriste
Ukoliko se koristi engleski alfabet prosiren ciframa i specijalnim...
Ukoliko se koristi engleski alfabet za kljuc duzine 26 koliki je...
Ako je x = 01101, y = 01010 i z = 00111, koliko je (x XOR x XOR x XOR...
Kod blokovskih algoritama, blok sifrata se dobija visestrukom primenom...
Sigurnist DES algoritmima pociva na
Postupak kojim se otvoreni tekst zapisuje u obliku binarnog niza...
Aktivni napad koji onemogucava funkcionisanje sistema  ili...
Prisluskivanje je napad na
Kod OTP sifre, duzina kljuca:
Neka je Z skup znakova nad kojim se definise kljuc. Ukoliko je kljuc...
Za ECB i CBC rezime rada vazi:
KOji od sledecih algoritama moze da se koristi za digitalno...
Duzina otiska (hes vrednosti ) MD5 algoritma je
Za siforvanje i digitalno potpisivanje koristi se
Hes funkcija se ne koristi za sifrovanje poruka jer je 
Generator pseudoslucajnih vrednosti na osnovu kratkog slucajnog kljuca...
Neporecivost je servis koji prijemnoj strani pruza neoboriv dokaz da:
Duzina kljuca koji je potreban za izracunavanje HMAC vrednosti je
Simetrični algoritmi:
Odrediti  red velicine broja operacija sifrovanja i desifrovanja...
Kolizija kod heš funkcija označava pojavu da
Jedna od nepozeljnih osobina generatora pseudoslucajnih brojeva je
Kod CNC rezima rada blokovskih algoritama, evenutalna namerna ili...
DES algoritam je
Kod blokovskog algoritma, po pravilu
Zadatak savremenih algoritama sifrovanja:
Za detekciju postojanja skrivenih poruka u steganoanalizi koristi...
Blokovski algoritmi u jednom trenutku
Sifrarski sistem kod koga je vreme potrebno za razbijanje duze od...
 Ugradnjom podataka o vremenu slanja poruke u samu poruku
Tehnika kojom se u digitalni sadrzaj utiskuju dodatne informacije kao...
Za hes funckije je vazno
U Difi Helmanovom broj p koji se koristi za stepenovanje po modlu p...
Dati su parametri p=17 i q=5. Alisa i Bob razmenjuju kljuceve uz pomoc...
Sifrarski sistem kod koga je cena razbijanja sifrata prevazilazi...
ByteSub, ShiftRow,MaxColumn,AddRoundKey su operacije koje se vezuju...
Izabrati tacno tvrdjenje
Da bi se uspesno desifrovao sifrat sifrovan sekvencijalnim sifarskim...
 Sigurnost kriptosistema počiva na
Kada se informacija krije unutar video fajla uglavnom se koristi
Sta je rezultat operacije ((a XOR b) XOR a) XOR (a XOR b)
Sta je rezultat operacije (((x XOR x) XOR y) XOR y) XOR x?
Digitalni potpis je servis koji treba da obezbedi 
Koji od navedenih algoritama je sekvencijalni 
Simetricni kriptosistemi su oni
Sta je rezultat operacije ((a XOR b) XOR b) XOR (a XOR b) XOR 0
Sigurnost RSA algoritma lezi u
Da bi se smanjila dužina digitalnog potpisa poruke, računa se
Dati su parametri p=17 i q=11. Alisa i Bob razmenjuju kljuceve uz...
Nedostatak ECB rezima je to sto
Supstitucija kod koje se tokom sifrovanja jedan znak ne zamenjuje uvek...
Prednost sifrovanja hes vrednosti (prilikom autentifikacije i provere...
Alisa i Bob razmenjuju zajednicku tajnu koristeci Difi Helmanov...
Serifikaciono telo CA potvrdjuje valdinost javnih kljuceva...
Heš funkcija je 
Funkicje koje relativno lako mogu da se izracunaju ali njihova...
DOS je napad na 
Za digitalno potpisivanje koriste se
Difi Helmanov algoritam se koristi za
Skup aktivnosti koje treba da se obezbede da neovlascena strana u...
Sifrarski sistem ako ne moze da bude razbijen ni uz primenu...
U klasifikaciji steganografskih  tehnika kompjuterska...
AES moze da ima 
Da li Hes funkcija treba da poseduje svojstvo lavinskog efekta?
Ukoliko se koristi engleski alfabet za kljuc duzine 4, koliki je...
MAC se dobija tako sto
Nedostatak OTP sifre je to
Da li se asimetricni kriptografski algoritmi cesto koriste za...
Fejstelova sifra  (mreza) predstavlja 
 Odrediti redosled koraka kod izbora tajnog i javnog ključa RSA...
Aktivan napad kojim se neovlašćeno menjaju podaci, pristupna...
Algoritam koji prilikom sifrovanja obradjuje blokove otvorenog teksta...
Autentifikacija koja se realizuje siforvanjem hes vrednosti...
Supstitucija kod koje je osnovni element vrsenje supstitucije grupa...
AES algoritam je 
Linearni pomeracki registri
Staticka detekcija je metoda koja se koristi 
Osnovna primena hes funkcije je 
ECB (Electronic Codebook Mode)
Svojstvo sifrarskih algoritama tako da su kod napada potpunom...
Skup aktivnosti koje treba da sprece ili detektuju neovlascenu izmenu...
Supstitucija kod koje se jedan znak zamenjuje uvek istim znakom naziva...
Sertifikat sluzi za 
Kriptografski sistem koji koristeci sistem sa javnim kljucem za...
Algoritam koji elemente otvorenog teksta obradjuju jedan po jedan...
Spoji tacno
Koje su od navedenih sifri polialfabetske
MAC moze da se koristi u procesu 
CB(chiper block chaining)
Aktivan napad kojim se neovlasceno menjaju podaci pristupna prava ili...
 Pseudo slučajan niz brojeva se koristi
Koje su sifre od navedenih poligramske
Supstitucija kod koje se vecina znakova menja istim sem onih...
Koja od navedenih sifri je monoalfabetska
Koje su od navedenih sifri poligramske
Ako posiljalac sifruje poruku javnim kljucem primaoca i takav sifrat...
Alert!

Advertisement