Question Bank
1899 approved questions from the community
What is the purpose of key expansion in AES?
Which of the following is a common symmetric encryption algorithm?
A hash function that is pre-image resistant means it should be computationally infeasible to derive the original input from the hash output.
What is the primary use case for symmetric encryption?
A 256-bit ECC key provides security equivalent to a 3072-bit RSA key.
Digital signatures prevent non-repudiation by making it impossible for the sender to deny sending a message.
Which of the following are required properties of a cryptographic hash function? (Select all that apply)
Stream ciphers typically have higher latency than block ciphers.
Triple DES is more efficient than AES for modern encryption needs.
What is the primary advantage of asymmetric cryptography over symmetric cryptography?
What mathematical problem is RSA security based on?
What is second-preimage resistance in hash functions?
Symmetric encryption typically requires shorter key lengths than asymmetric encryption for equivalent security.
The security of RSA relies on the difficulty of the discrete logarithm problem.
Compared to RSA, what is a key advantage of ECC (Elliptic Curve Cryptography)?
What is the purpose of OCSP (Online Certificate Status Protocol)?
What type of cipher is the Caesar cipher?
What role does a Certificate Authority (CA) play in PKI?
What network structure does AES use?
How many rounds does AES perform with a 128-bit key?