Sign In
Computer Science

Cryptography Quiz & Flashcards

Master Cryptography concepts with our interactive study cards featuring 48 practice Quiz questions and 50 flashcards to boost your exam scores and retention in Computer Science.

Create your own study sets

Turn any PDF, lecture notes, or ChatGPT conversation into interactive quizzes in seconds.

Get started

48 Multiple Choice Questions and Answers on Cryptography

Revise and practice with 48 comprehensive MCQ on Cryptography, featuring detailed explanations to deepen your understanding of Computer Science Quiz concepts. Perfect for quick review and exam preparation.

1 Which cryptographic algorithm is based on the difficulty of factoring large numbers?

A. RSA
B. AES
C. SHA-256
D. Blowfish
Explanation

RSA relies on the difficulty of factoring large numbers, unlike AES (symmetric) and SHA-256 (hashing).

2 What type of attack involves trying all possible keys?

A. Brute force attack
B. Man-in-the-middle attack
C. Replay attack
D. Phishing attack
Explanation

A brute force attack involves trying all possible keys, unlike the other listed attacks.

3 In asymmetric encryption, which key is used to decrypt a message?

A. Private key
B. Public key
C. Session key
D. Symmetric key
Explanation

In asymmetric encryption, the private key is used for decryption, while the public key is for encryption.

4 Which cryptographic method provides authenticity and integrity?

A. Digital signatures
B. Hashing
C. Symmetric encryption
D. Steganography
Explanation

Digital signatures provide authenticity and integrity, while hashing ensures data integrity only.

5 Which of the following is a property of a one-way hash function?

A. Irreversibility
B. Symmetric
C. Reversible
D. Key-based
Explanation

One-way hash functions are irreversible, unlike symmetric encryption which is reversible with a key.

6 What is the main advantage of using a digital certificate?

A. It binds a public key to an entity
B. It encrypts data
C. It hashes passwords
D. It generates pseudorandom numbers
Explanation

A digital certificate binds a public key to an entity, unlike encryption or hashing functions.

7 Which cryptographic concept ensures data cannot be altered in transit?

A. Integrity
B. Confidentiality
C. Availability
D. Anonymity
Explanation

Integrity ensures data remains unchanged during transmission, unlike confidentiality which hides data.

8 What is the primary use of a nonce in cryptography?

A. To prevent replay attacks
B. To encrypt data
C. To hash passwords
D. To sign messages
Explanation

A nonce is used to prevent replay attacks by ensuring each operation is unique.

9 Which cryptographic technique is used to securely store passwords?

A. Hashing with salt
B. Symmetric encryption
C. Asymmetric encryption
D. Digital signatures
Explanation

Hashing with salt securely stores passwords by preventing rainbow table attacks.

10 What does perfect forward secrecy protect against?

A. Future exposure of session keys
B. Current data interception
C. Unauthorized access
D. Data duplication
Explanation

Perfect forward secrecy protects session keys from being compromised even if the private key is exposed in the future.

11 What is the function of a block cipher?

A. Encrypts data in fixed-size blocks
B. Encrypts data bit by bit
C. Hashes data
D. Signs messages
Explanation

A block cipher encrypts data in fixed-size blocks, unlike stream ciphers that encrypt bit by bit.

12 Which of the following best describes a man-in-the-middle attack?

A. Interception and alteration of communication
B. Brute-forcing keys
C. Intercepting hashed data
D. Using symmetric keys
Explanation

A man-in-the-middle attack involves intercepting and potentially altering communication between parties.

13 What is the primary role of a Certificate Authority (CA)?

A. Issuing digital certificates
B. Encrypting data
C. Generating keys
D. Hashing passwords
Explanation

A CA issues digital certificates to verify the ownership of public keys, unlike encrypting or hashing functions.

14 Which cryptographic method uses both public and private keys?

A. Asymmetric encryption
B. Symmetric encryption
C. Hashing
D. Steganography
Explanation

Asymmetric encryption uses both public and private keys, unlike symmetric encryption which uses a single key.

15 What does the acronym 'PKI' stand for?

A. Public Key Infrastructure
B. Private Key Integration
C. Public Key Innovation
D. Private Key Implementation
Explanation

PKI stands for Public Key Infrastructure, which manages digital certificates and public-key pairs.

16 Which of the following is a characteristic of stream ciphers?

A. Encrypts data bit by bit
B. Encrypts data in blocks
C. Hashes data
D. Signs messages
Explanation

Stream ciphers encrypt data bit by bit, unlike block ciphers which encrypt fixed-size blocks.

17 What is the purpose of a cryptographic seed?

A. Initialize pseudorandom number generators
B. Encrypt data
C. Hash passwords
D. Sign messages
Explanation

A cryptographic seed initializes pseudorandom number generators for secure key generation.

18 Which statement about ECC is true?

A. It uses elliptic curves for encryption
B. It uses large prime numbers for encryption
C. It encrypts data in blocks
D. It hashes passwords
Explanation

ECC uses elliptic curves for encryption, unlike RSA which uses large prime numbers.

19 What is the main purpose of Transport Layer Security (TLS)?

A. To secure data transmission over a network
B. To hash passwords
C. To encrypt stored data
D. To issue digital certificates
Explanation

TLS secures data transmission over a network by encrypting the connection between systems.

20 Which method is used to prove knowledge without revealing the information itself?

A. Zero-knowledge proof
B. Digital signature
C. Symmetric encryption
D. Public key infrastructure
Explanation

Zero-knowledge proof allows proving knowledge without revealing the information itself.

21 What is the function of a Trusted Platform Module (TPM)?

A. Store cryptographic keys securely
B. Encrypt data
C. Hash passwords
D. Issue digital certificates
Explanation

A TPM stores cryptographic keys securely, unlike functions like encrypting or hashing data.

22 Which type of encryption uses the same key for both encryption and decryption?

A. Symmetric encryption
B. Asymmetric encryption
C. Hashing
D. Digital signature
Explanation

Symmetric encryption uses the same key for both processes, unlike asymmetric encryption.

23 What does the term 'cryptanalysis' refer to?

A. Analyzing cryptographic systems for weaknesses
B. Encrypting data
C. Hashing passwords
D. Issuing digital certificates
Explanation

Cryptanalysis involves analyzing cryptographic systems for weaknesses, not encrypting or hashing.

24 What is the primary goal of a hash function?

A. To produce a fixed-size digest from data
B. To encrypt data
C. To decrypt messages
D. To issue digital certificates
Explanation

A hash function produces a fixed-size digest, unlike encryption and decryption processes.

25 Which of the following best describes a replay attack?

A. Replaying a valid data transmission
B. Brute-forcing passwords
C. Intercepting encrypted data
D. Using expired keys
Explanation

A replay attack involves replaying a valid transmission, unlike brute-forcing or key misuse.

26 What is the role of cryptography in blockchain technology?

A. Ensuring transaction security and integrity
B. Encrypting stored data
C. Hashing passwords
D. Issuing digital certificates
Explanation

In blockchain, cryptography ensures transaction security and integrity, not just data encryption.

27 What is a common misconception about encryption strength?

A. Longer keys always mean stronger encryption
B. Older algorithms are always secure
C. All encryption is unbreakable
D. Hashing is the same as encryption
Explanation

Longer keys are not always stronger; algorithm efficiency and implementation are also crucial.

28 Which cryptographic method uses elliptic curves?

A. ECC
B. RSA
C. AES
D. SHA-256
Explanation

Elliptic Curve Cryptography (ECC) uses elliptic curves, unlike RSA or symmetric algorithms.

29 What is the significance of the birthday paradox in cryptography?

A. Probability of hash collisions
B. Probability of key reuse
C. Probability of encryption failure
D. Probability of signature duplication
Explanation

The birthday paradox relates to the probability of hash collisions, which can affect hash functions.

30 Which cryptographic technique is essential for secure web transactions?

A. TLS
B. Symmetric encryption
C. Hashing
D. Steganography
Explanation

TLS is essential for securing web transactions by encrypting data in transit.

31 What is the primary function of a digital envelope?

A. Protect symmetric key with asymmetric encryption
B. Encrypt messages with a public key
C. Store cryptographic keys
D. Hash passwords
Explanation

A digital envelope protects a symmetric key using asymmetric encryption.

32 Which type of attack exploits physical implementation aspects?

A. Side-channel attack
B. Man-in-the-middle attack
C. Brute force attack
D. Phishing attack
Explanation

A side-channel attack exploits physical aspects like power or timing, unlike other listed attacks.

33 Which of the following is a form of asymmetric encryption?

A. RSA
B. AES
C. DES
D. Blowfish
Explanation

RSA is a form of asymmetric encryption, while AES, DES, and Blowfish are symmetric.

34 What is the purpose of a cryptographic key?

A. To transform plaintext into ciphertext
B. To generate random numbers
C. To hash data
D. To issue digital certificates
Explanation

A cryptographic key transforms plaintext into ciphertext, unlike functions like hashing.

35 Which algorithm is commonly used for hashing in blockchain?

A. SHA-256
B. RSA
C. AES
D. ECC
Explanation

SHA-256 is widely used for hashing in blockchain, unlike RSA or ECC which are encryption algorithms.

36 What is the principle of Kerckhoffs's principle?

A. Security should not depend on secrecy of the algorithm
B. Security relies on long key lengths
C. Security requires frequent key changes
D. Security is based on user authentication
Explanation

Kerckhoffs's principle states that security should not depend on the secrecy of the algorithm.

37 Which cryptographic concept uses a pair of keys for encryption and decryption?

A. Asymmetric encryption
B. Symmetric encryption
C. Hashing
D. Digital signatures
Explanation

Asymmetric encryption uses a pair of keys, unlike symmetric encryption which uses a single key.

38 What is the main advantage of using symmetric encryption?

A. Speed and efficiency
B. No need for key management
C. Stronger security with smaller keys
D. Ease of use with public keys
Explanation

Symmetric encryption is faster and more efficient, but requires key management.

39 What does a cryptographic salt prevent?

A. Rainbow table attacks
B. Brute force attacks
C. Man-in-the-middle attacks
D. Data interception
Explanation

A cryptographic salt prevents rainbow table attacks by adding randomness to password hashes.

40 Which of the following is not a feature of secure hash functions?

A. Reversibility
B. Deterministic output
C. Fixed-size output
D. Collision resistance
Explanation

Secure hash functions are not reversible, but they produce deterministic, fixed-size outputs and are collision-resistant.

41 What is the function of a key derivation function?

A. To derive secret keys from a secret value
B. To encrypt data
C. To hash passwords
D. To issue digital certificates
Explanation

A key derivation function derives secret keys, unlike functions that directly encrypt or hash data.

42 What is the main weakness of symmetric key encryption?

A. Key distribution
B. Complexity
C. Speed
D. Key length
Explanation

The main weakness is key distribution, as the same key must be securely shared among parties.

43 Which cryptographic method is primarily used for data integrity?

A. Hashing
B. Symmetric encryption
C. Asymmetric encryption
D. Steganography
Explanation

Hashing is used for data integrity by ensuring data has not been altered.

44 What is the purpose of using a padding oracle attack?

A. To decrypt data encrypted with block ciphers
B. To test symmetric encryption strength
C. To generate keys
D. To hash data
Explanation

A padding oracle attack exploits padding errors to decrypt data encrypted with block ciphers.

45 Which protocol is often used to establish a secure channel over an insecure network?

A. TLS
B. HTTP
C. FTP
D. SMTP
Explanation

TLS is used to establish a secure channel over an insecure network, unlike HTTP, FTP, or SMTP.

46 What is the main security feature of a digital signature?

A. Authenticity
B. Confidentiality
C. Availability
D. Redundancy
Explanation

A digital signature provides authenticity, ensuring the message was sent by the claimed sender.

47 Which cryptographic practice involves exchanging keys over an insecure channel?

A. Diffie-Hellman key exchange
B. RSA encryption
C. AES encryption
D. Hashing
Explanation

The Diffie-Hellman key exchange allows secure key exchange over an insecure channel.

48 What is a common use of the RSA algorithm?

A. Encrypting data with public keys
B. Hashing data
C. Encrypting data with symmetric keys
D. Generating random numbers
Explanation

RSA is commonly used for encrypting data with public keys, unlike symmetric encryption or hashing.