Question Bank
3705 approved questions from the community
How many rounds does AES perform with a 128-bit key?
What is the effective key length of DES?
What is a permutation cipher?
In Feistel ciphers, the decryption process uses the same structure as encryption but with keys in reverse order.
What type of cipher is the Caesar cipher?
Which of the following are practical applications of PKI? (Select all that apply)
Which of the following are best practices for cryptographic systems? (Select all that apply)
Which of the following are symmetric encryption algorithms? (Select all that apply)
What is AES?
What mathematical problem is RSA security based on?
Which of the following are key algorithmic functions used in AES? (Select all that apply)
Which of the following are reasons why DES is considered insecure today? (Select all that apply)
Which of the following are key components of a digital signature system? (Select all that apply)
Which of the following are required properties for a One-Time Pad to achieve perfect secrecy? (Select all that apply)
Which of the following are advantages of ECC over RSA? (Select all that apply)
In the digital signature verification process, what happens after computing the hash of the target document?
Which of the following are characteristics of stream ciphers? (Select all that apply)
Which of the following are required properties of a cryptographic hash function? (Select all that apply)
What is a digital signature?
A 256-bit ECC key provides security equivalent to a 3072-bit RSA key.