Question Bank

3705 approved questions from the community

Simple substitution ciphers are vulnerable to frequency analysis attacks.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

AES is an asymmetric encryption algorithm.

EASY
TRUE FALSE
20s
Cryptography
by Mohamed

The Atbash cipher is a type of substitution cipher that reverses the alphabet.

HARD
TRUE FALSE
25s
Cryptography
by Mohamed

Which of the following contributed to DES being considered insecure? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

The One-Time Pad is the only practical cryptosystem that achieves perfect secrecy.

HARD
TRUE FALSE
25s
Cryptography
by Mohamed

What is a nonce in cryptography?

EASY
SINGLE CHOICE
30s
Cryptography
by Mohamed

A nonce should be used multiple times to ensure consistent encryption results.

EASY
TRUE FALSE
20s
Cryptography
by Mohamed

What is the rail fence cipher an example of?

HARD
SINGLE CHOICE
35s
Cryptography
by Mohamed

What is the meet-in-the-middle attack on Feistel networks?

HARD
SINGLE CHOICE
45s
Cryptography
by Mohamed

Which of the following is a common symmetric encryption algorithm?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

What is the primary advantage of asymmetric cryptography over symmetric cryptography?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

What is the primary use case for asymmetric encryption?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

ECC signature creation and verification are typically faster than RSA for smaller messages.

HARD
TRUE FALSE
30s
Cryptography
by Mohamed

What is a cryptographic hash function?

EASY
SINGLE CHOICE
30s
Cryptography
by Mohamed

What does it mean for a cryptographic algorithm to be computationally secure?

MEDIUM
SINGLE CHOICE
40s
Cryptography
by Mohamed

The security of RSA relies on the difficulty of the discrete logarithm problem.

MEDIUM
TRUE FALSE
30s
Cryptography
by Mohamed

What is the primary use case for symmetric encryption?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

Why is AES preferred over DES in modern applications?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

RSA signature creation is generally faster than RSA encryption.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

Cryptography combines techniques from mathematics, computer science, and electrical engineering.

EASY
TRUE FALSE
20s
Cryptography
by Mohamed
PreviousPage 8 of 186Next