Question Bank

3705 approved questions from the community

What distinguishes AES's structure from DES's Feistel structure?

HARD
SINGLE CHOICE
45s
Cryptography
by Mohamed

The Atbash cipher is a type of substitution cipher that reverses the alphabet.

HARD
TRUE FALSE
25s
Cryptography
by Mohamed

What is the primary use case for asymmetric encryption?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

What cryptanalysis method introduced in the 1970s aims to find statistical patterns in DES output?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

What is the meet-in-the-middle attack on Feistel networks?

HARD
SINGLE CHOICE
45s
Cryptography
by Mohamed

Which of the following contributed to DES being considered insecure? (Select all that apply)

HARD
MULTIPLE CHOICE
45s
Cryptography
by Mohamed

How many rounds of encryption does DES perform?

MEDIUM
SINGLE CHOICE
25s
Cryptography
by Mohamed

Decryption converts ciphertext back into plaintext.

EASY
TRUE FALSE
20s
Cryptography
by Mohamed

ECC signature creation and verification are typically faster than RSA for smaller messages.

HARD
TRUE FALSE
30s
Cryptography
by Mohamed

The security of RSA relies on the difficulty of the discrete logarithm problem.

MEDIUM
TRUE FALSE
30s
Cryptography
by Mohamed

Hash functions must produce the same output size regardless of input size.

MEDIUM
TRUE FALSE
25s
Cryptography
by Mohamed

Why is AES preferred over DES in modern applications?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

In Feistel ciphers, the decryption process uses the same structure as encryption but with keys in reverse order.

MEDIUM
TRUE FALSE
30s
Cryptography
by Mohamed

What is the primary reason Feistel ciphers are elegant and widely used?

HARD
SINGLE CHOICE
40s
Cryptography
by Mohamed

What does RSA stand for?

EASY
SINGLE CHOICE
25s
Cryptography
by Mohamed

The security of Feistel ciphers depends on both the strength of the substitution function and the quality of round key generation.

HARD
TRUE FALSE
30s
Cryptography
by Mohamed

What is Triple DES (3DES)?

MEDIUM
SINGLE CHOICE
35s
Cryptography
by Mohamed

Encryption converts plaintext into ciphertext.

EASY
TRUE FALSE
20s
Cryptography
by Mohamed

What is the primary use case for symmetric encryption?

MEDIUM
SINGLE CHOICE
30s
Cryptography
by Mohamed

DES is considered secure for modern cryptographic applications.

EASY
TRUE FALSE
20s
Cryptography
by Mohamed
PreviousPage 9 of 186Next