Question Bank

3705 approved questions from the community

How many rounds does AES perform with a 128-bit key?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

What is the effective key length of DES?

MEDIUM
SINGLE CHOICE
25s
Cryptography
by Mohamed

What is a permutation cipher?

EASY
SINGLE CHOICE
25s
Cryptography
by Mohamed

In Feistel ciphers, the decryption process uses the same structure as encryption but with keys in reverse order.

MEDIUM
TRUE FALSE
30s
Cryptography
by Mohamed

What type of cipher is the Caesar cipher?

MEDIUM
SINGLE CHOICE
25s
Cryptography
by Mohamed

Which of the following are practical applications of PKI? (Select all that apply)

HARD
MULTIPLE CHOICE
50s
Cryptography
by Mohamed

Which of the following are best practices for cryptographic systems? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

Which of the following are symmetric encryption algorithms? (Select all that apply)

EASY
MULTIPLE CHOICE
35s
Cryptography
by Mohamed

What is AES?

EASY
SINGLE CHOICE
25s
Cryptography
by Mohamed

What mathematical problem is RSA security based on?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

Which of the following are key algorithmic functions used in AES? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

Which of the following are reasons why DES is considered insecure today? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
40s
Cryptography
by Mohamed

Which of the following are key components of a digital signature system? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
40s
Cryptography
by Mohamed

Which of the following are required properties for a One-Time Pad to achieve perfect secrecy? (Select all that apply)

HARD
MULTIPLE CHOICE
40s
Cryptography
by Mohamed

Which of the following are advantages of ECC over RSA? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

In the digital signature verification process, what happens after computing the hash of the target document?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

Which of the following are characteristics of stream ciphers? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
40s
Cryptography
by Mohamed

Which of the following are required properties of a cryptographic hash function? (Select all that apply)

MEDIUM
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

What is a digital signature?

EASY
SINGLE CHOICE
30s
Cryptography
by Mohamed

A 256-bit ECC key provides security equivalent to a 3072-bit RSA key.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed
PreviousPage 12 of 186Next