Cryptography Quiz & Flashcards
Master Cryptography concepts with our interactive study cards featuring 48 practice Quiz questions and 50 flashcards to boost your exam scores and retention in Computer Science.
Quiz Complete!
0%
0
You are currently studying 10 out of 48 Questions
Sign in to unlock allCreate your own study sets
Turn any PDF, lecture notes, or ChatGPT conversation into interactive quizzes in seconds.
48 Multiple Choice Questions and Answers on Cryptography
Revise and practice with 48 comprehensive MCQ on Cryptography, featuring detailed explanations to deepen your understanding of Computer Science Quiz concepts. Perfect for quick review and exam preparation.
1 Which cryptographic algorithm is based on the difficulty of factoring large numbers?
RSA relies on the difficulty of factoring large numbers, unlike AES (symmetric) and SHA-256 (hashing).
2 What type of attack involves trying all possible keys?
A brute force attack involves trying all possible keys, unlike the other listed attacks.
3 In asymmetric encryption, which key is used to decrypt a message?
In asymmetric encryption, the private key is used for decryption, while the public key is for encryption.
4 Which cryptographic method provides authenticity and integrity?
Digital signatures provide authenticity and integrity, while hashing ensures data integrity only.
5 Which of the following is a property of a one-way hash function?
One-way hash functions are irreversible, unlike symmetric encryption which is reversible with a key.
6 What is the main advantage of using a digital certificate?
A digital certificate binds a public key to an entity, unlike encryption or hashing functions.
7 Which cryptographic concept ensures data cannot be altered in transit?
Integrity ensures data remains unchanged during transmission, unlike confidentiality which hides data.
8 What is the primary use of a nonce in cryptography?
A nonce is used to prevent replay attacks by ensuring each operation is unique.
9 Which cryptographic technique is used to securely store passwords?
Hashing with salt securely stores passwords by preventing rainbow table attacks.
10 What does perfect forward secrecy protect against?
Perfect forward secrecy protects session keys from being compromised even if the private key is exposed in the future.
11 What is the function of a block cipher?
A block cipher encrypts data in fixed-size blocks, unlike stream ciphers that encrypt bit by bit.
12 Which of the following best describes a man-in-the-middle attack?
A man-in-the-middle attack involves intercepting and potentially altering communication between parties.
13 What is the primary role of a Certificate Authority (CA)?
A CA issues digital certificates to verify the ownership of public keys, unlike encrypting or hashing functions.
14 Which cryptographic method uses both public and private keys?
Asymmetric encryption uses both public and private keys, unlike symmetric encryption which uses a single key.
15 What does the acronym 'PKI' stand for?
PKI stands for Public Key Infrastructure, which manages digital certificates and public-key pairs.
16 Which of the following is a characteristic of stream ciphers?
Stream ciphers encrypt data bit by bit, unlike block ciphers which encrypt fixed-size blocks.
17 What is the purpose of a cryptographic seed?
A cryptographic seed initializes pseudorandom number generators for secure key generation.
18 Which statement about ECC is true?
ECC uses elliptic curves for encryption, unlike RSA which uses large prime numbers.
19 What is the main purpose of Transport Layer Security (TLS)?
TLS secures data transmission over a network by encrypting the connection between systems.
20 Which method is used to prove knowledge without revealing the information itself?
Zero-knowledge proof allows proving knowledge without revealing the information itself.
21 What is the function of a Trusted Platform Module (TPM)?
A TPM stores cryptographic keys securely, unlike functions like encrypting or hashing data.
22 Which type of encryption uses the same key for both encryption and decryption?
Symmetric encryption uses the same key for both processes, unlike asymmetric encryption.
23 What does the term 'cryptanalysis' refer to?
Cryptanalysis involves analyzing cryptographic systems for weaknesses, not encrypting or hashing.
24 What is the primary goal of a hash function?
A hash function produces a fixed-size digest, unlike encryption and decryption processes.
25 Which of the following best describes a replay attack?
A replay attack involves replaying a valid transmission, unlike brute-forcing or key misuse.
26 What is the role of cryptography in blockchain technology?
In blockchain, cryptography ensures transaction security and integrity, not just data encryption.
27 What is a common misconception about encryption strength?
Longer keys are not always stronger; algorithm efficiency and implementation are also crucial.
28 Which cryptographic method uses elliptic curves?
Elliptic Curve Cryptography (ECC) uses elliptic curves, unlike RSA or symmetric algorithms.
29 What is the significance of the birthday paradox in cryptography?
The birthday paradox relates to the probability of hash collisions, which can affect hash functions.
30 Which cryptographic technique is essential for secure web transactions?
TLS is essential for securing web transactions by encrypting data in transit.
31 What is the primary function of a digital envelope?
A digital envelope protects a symmetric key using asymmetric encryption.
32 Which type of attack exploits physical implementation aspects?
A side-channel attack exploits physical aspects like power or timing, unlike other listed attacks.
33 Which of the following is a form of asymmetric encryption?
RSA is a form of asymmetric encryption, while AES, DES, and Blowfish are symmetric.
34 What is the purpose of a cryptographic key?
A cryptographic key transforms plaintext into ciphertext, unlike functions like hashing.
35 Which algorithm is commonly used for hashing in blockchain?
SHA-256 is widely used for hashing in blockchain, unlike RSA or ECC which are encryption algorithms.
36 What is the principle of Kerckhoffs's principle?
Kerckhoffs's principle states that security should not depend on the secrecy of the algorithm.
37 Which cryptographic concept uses a pair of keys for encryption and decryption?
Asymmetric encryption uses a pair of keys, unlike symmetric encryption which uses a single key.
38 What is the main advantage of using symmetric encryption?
Symmetric encryption is faster and more efficient, but requires key management.
39 What does a cryptographic salt prevent?
A cryptographic salt prevents rainbow table attacks by adding randomness to password hashes.
40 Which of the following is not a feature of secure hash functions?
Secure hash functions are not reversible, but they produce deterministic, fixed-size outputs and are collision-resistant.
41 What is the function of a key derivation function?
A key derivation function derives secret keys, unlike functions that directly encrypt or hash data.
42 What is the main weakness of symmetric key encryption?
The main weakness is key distribution, as the same key must be securely shared among parties.
43 Which cryptographic method is primarily used for data integrity?
Hashing is used for data integrity by ensuring data has not been altered.
44 What is the purpose of using a padding oracle attack?
A padding oracle attack exploits padding errors to decrypt data encrypted with block ciphers.
45 Which protocol is often used to establish a secure channel over an insecure network?
TLS is used to establish a secure channel over an insecure network, unlike HTTP, FTP, or SMTP.
46 What is the main security feature of a digital signature?
A digital signature provides authenticity, ensuring the message was sent by the claimed sender.
47 Which cryptographic practice involves exchanging keys over an insecure channel?
The Diffie-Hellman key exchange allows secure key exchange over an insecure channel.
48 What is a common use of the RSA algorithm?
RSA is commonly used for encrypting data with public keys, unlike symmetric encryption or hashing.
uizGPT