Question Bank
721 approved questions from the community
What is the effective key length of Triple DES when using three distinct keys?
The Atbash cipher is a type of substitution cipher that reverses the alphabet.
What is the rail fence cipher an example of?
What does it mean for a hash function to be collision resistant?
Which of the following are practical applications of PKI? (Select all that apply)
Which of the following are required properties for a One-Time Pad to achieve perfect secrecy? (Select all that apply)
Which of the following are stages in each round of a Feistel cipher? (Select all that apply)
Which of the following contributed to DES being considered insecure? (Select all that apply)
In the context of perfect secrecy, what condition must be satisfied?
What is the main difference between electronic signatures and digital signatures?
AES operations in Galois Field transformation use finite field arithmetic.
What cryptographic operation does AES perform on the state array?
The security of Feistel ciphers depends on both the strength of the substitution function and the quality of round key generation.
What is the meet-in-the-middle attack on Feistel networks?
Which of the following security properties does PKI provide? (Select all that apply)
What is linear cryptanalysis in the context of DES?
In AES encryption, what happens in the final round that differs from other rounds?
What is perfect secrecy in cryptography?
What is the purpose of using codebase granularity as a strategy for defining Bounded Contexts?
What is Two-Phase Commit (2PC) in DDD?