Question Bank

3705 approved questions from the community

Asymmetric encryption is generally faster than symmetric encryption for encrypting large amounts of data.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

A hash function that is pre-image resistant means it should be computationally infeasible to derive the original input from the hash output.

MEDIUM
TRUE FALSE
30s
Cryptography
by Mohamed

What is AES?

EASY
SINGLE CHOICE
25s
Cryptography
by Mohamed

What is a permutation cipher?

EASY
SINGLE CHOICE
25s
Cryptography
by Mohamed

Digital signatures prevent non-repudiation by making it impossible for the sender to deny sending a message.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

What type of cipher is the Caesar cipher?

MEDIUM
SINGLE CHOICE
25s
Cryptography
by Mohamed

What network structure does AES use?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

In the digital signature verification process, what happens after computing the hash of the target document?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

What is a digital signature?

EASY
SINGLE CHOICE
30s
Cryptography
by Mohamed

What is perfect secrecy in cryptography?

HARD
SINGLE CHOICE
45s
Cryptography
by Mohamed

Why is AES preferred over DES in modern applications?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

AES operations in Galois Field transformation use finite field arithmetic.

HARD
TRUE FALSE
30s
Cryptography
by Mohamed

What is the main difference between symmetric and asymmetric cryptography?

EASY
SINGLE CHOICE
35s
Cryptography
by Mohamed

AES is an asymmetric encryption algorithm.

EASY
TRUE FALSE
20s
Cryptography
by Mohamed

What is Public Key Infrastructure (PKI)?

EASY
SINGLE CHOICE
35s
Cryptography
by Mohamed

What role does a Certificate Authority (CA) play in PKI?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

What does it mean for a hash function to be collision resistant?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

What is a substitution cipher?

EASY
SINGLE CHOICE
25s
Cryptography
by Mohamed

In symmetric cryptography, the same key is used for both encryption and decryption.

EASY
TRUE FALSE
20s
Cryptography
by Mohamed

How many rounds does AES perform with a 128-bit key?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed
PreviousPage 10 of 186Next