Question Bank
1899 approved questions from the community
What is the effective key length of DES?
What mathematical problem is RSA security based on?
What is the purpose of key expansion in AES?
Which of the following are required properties of a cryptographic hash function? (Select all that apply)
In block ciphers, transmission errors propagate throughout the entire block.
Which of the following are core elements of Public Key Infrastructure (PKI)? (Select all that apply)
RSA key generation is generally faster than ECC key generation.
What is the purpose of OCSP (Online Certificate Status Protocol)?
Hash functions must produce the same output size regardless of input size.
RSA signature creation is generally faster than RSA encryption.
What is the primary use case for symmetric encryption?
Which key in asymmetric cryptography must be kept secret?
In asymmetric cryptography, which key is used for encryption?
What is second-preimage resistance in hash functions?
What is the primary use case for asymmetric encryption?
Which famous cipher uses the Feistel structure?
What does it mean for a cryptographic algorithm to be computationally secure?
Digital signatures can only be verified by the sender.
A 256-bit ECC key provides security equivalent to a 3072-bit RSA key.
Simple substitution ciphers are vulnerable to frequency analysis attacks.