Cryptography December 7, 2023 Contents Results - #1. What is Cryptography? The study of secret societies The study of secret societies The art of writing in code or cipher The art of writing in code or cipher The science of predicting the future The science of predicting the future The analysis of ancient scripts The analysis of ancient scripts #2. 2. Which of the following is NOT a primary goal of cryptography? a) Confidentiality a) Confidentiality b) Integrity b) Integrity c) Availability c) Availability d) Authentication d) Authentication #3. 3. In symmetric-key cryptography, the same key is used for: a) Encryption and decryption a) Encryption and decryption b) Encryption only b) Encryption only c) Decryption only c) Decryption only d) None of the above d) None of the above #4. 4. The process of converting plaintext into ciphertext using a cryptographic algorithm and key is known as: a) Decryption a) Decryption b) Hashing b) Hashing c) Encryption c) Encryption d) Salting d) Salting #5. 5. The DES (Data Encryption Standard) algorithm is an example of: a) Symmetric-key cryptography a) Symmetric-key cryptography b) Asymmetric-key cryptography b) Asymmetric-key cryptography c) Hybrid cryptography c) Hybrid cryptography d) Quantum cryptography d) Quantum cryptography #6. 6. Which algorithm is commonly used for secure data transmission over the internet, providing confidentiality and integrity? a) AES (Advanced Encryption Standard) a) AES (Advanced Encryption Standard) c) DES (Data Encryption Standard) c) DES (Data Encryption Standard) d) MD5 (Message Digest Algorithm 5) d) MD5 (Message Digest Algorithm 5) #7. 7. The key exchange problem in symmetric-key cryptography refers to: a) Selecting appropriate encryption keys a) Selecting appropriate encryption keys b) Exchanging keys securely between parties b) Exchanging keys securely between parties c) Decrypting ciphertext without the key c) Decrypting ciphertext without the key d) Generating random numbers for encryption d) Generating random numbers for encryption #8. 8. In asymmetric-key cryptography, how many keys are used for encryption and decryption? a) One a) One b) Two b) Two c) Three c) Three d) Four d) Four #9. 9. The Diffie-Hellman key exchange algorithm is used for: a) Digital signatures a) Digital signatures b) Public-key encryption b) Public-key encryption c) Key exchange c) Key exchange d) Symmetric encryption d) Symmetric encryption #10. 10. Which asymmetric algorithm is commonly used for digital signatures and secure communication? a) AES a) AES b) RSA (for Digital Signatures) b) RSA (for Digital Signatures) c) ECC (Elliptic Curve Cryptography) c) ECC (Elliptic Curve Cryptography) d) Blowfish d) Blowfish #11. 11. Public keys are used for: a) Encrypting messages a) Encrypting messages b) Decrypting messages b) Decrypting messages c) Both encrypting and decrypting messages c) Both encrypting and decrypting messages d) Signing messages d) Signing messages #12. 12. Private keys in asymmetric cryptography are kept: a) Publicly shared a) Publicly shared b) Only on the sender's computer b) Only on the sender's computer c) Only on the recipient's computer c) Only on the recipient's computer d) Secret and known only to the key owner d) Secret and known only to the key owner #13. 13. Which cryptographic hash function is commonly used for ensuring data integrity? a) SHA-1 (Secure Hash Algorithm 1) a) SHA-1 (Secure Hash Algorithm 1) b) MD5 b) MD5 c) SHA-256 c) SHA-256 d) HMAC (Hash-based Message Authentication Code) d) HMAC (Hash-based Message Authentication Code) #14. 14. A digital signature is used to: a) Encrypt messages a) Encrypt messages b) Authenticate the sender b) Authenticate the sender c) Exchange symmetric keys c) Exchange symmetric keys d) Hash data for storage d) Hash data for storage #15. 15. The process of verifying the integrity of a message without revealing its content is achieved through: a) Encryption a) Encryption b) Digital signatures b) Digital signatures c) Hash functions c) Hash functions d) Key exchange d) Key exchange #16. 16. Which of the following is a weakness of symmetric-key cryptography? a) Slow key generation a) Slow key generation b) Key distribution problem b) Key distribution problem c) Limited key lengths c) Limited key lengths d) Dependence on public keys d) Dependence on public keys #17. 17. The concept of a "man-in-the-middle" attack is a concern for: a) Symmetric-key cryptography a) Symmetric-key cryptography b) Asymmetric-key cryptography b) Asymmetric-key cryptography c) Hash functions c) Hash functions d) Key exchange protocols d) Key exchange protocols #18. 18. Which algorithm is commonly used for securely transmitting passwords over a network? a) RSA a) RSA b) Diffie-Hellman b) Diffie-Hellman c) SHA-256 c) SHA-256 d) Blowfish d) Blowfish #19. 19. The process of converting ciphertext back to plaintext is known as: a) Hashing a) Hashing b) Decryption b) Decryption c) Encryption c) Encryption d) Salting d) Salting #20. 20. In the RSA algorithm, the security is based on the difficulty of: a) Prime factorization a) Prime factorization b) Hash collisions b) Hash collisions c) Symmetric key generation c) Symmetric key generation d) One-way functions d) One-way functions #21. 21. Which cryptographic concept is the basis for secure communication over an insecure channel? a) Public-key cryptography (aka. Asymmetric cryptography) a) Public-key cryptography (aka. Asymmetric cryptography) b) Symmetric-key cryptography b) Symmetric-key cryptography c) Digital signatures c) Digital signatures d) Hash functions d) Hash functions #22. 22. What is the primary purpose of a nonce (number used once) in cryptography? a) Ensuring data integrity a) Ensuring data integrity b) Preventing replay attacks b) Preventing replay attacks c) Generating random keys c) Generating random keys d) Hashing passwords d) Hashing passwords #23. 23. Elliptic Curve Cryptography (ECC) is known for: a) High key lengths a) High key lengths b) Slow encryption speed b) Slow encryption speed c) Strong security with shorter keys c) Strong security with shorter keys d) Symmetric key generation d) Symmetric key generation #24. 24. Which key length is considered more secure in modern cryptographic algorithms? a) 32 bits a) 32 bits b) 64 bits b) 64 bits c) 128 bits c) 128 bits d) 256 bits d) 256 bits #25. 25. The process of obscuring data to make it unreadable without special knowledge is called: a) Decryption a) Decryption b) Encryption b) Encryption c) Hashing c) Hashing d) Salting d) Salting #26. 26. Which algorithm is commonly used for generating digital signatures and creating a secure hash? a) RSA a) RSA b) HMAC b) HMAC c) DSA (Digital Signature Algorithm) c) DSA (Digital Signature Algorithm) d) MD5 d) MD5 #27. 27. The process of adding random data to a message before hashing is known as: a) Encryption a) Encryption b) Salting b) Salting c) Key exchange c) Key exchange d) Decryption d) Decryption #28. 28. The concept of a "trapdoor function" is associated with which type of cryptographic algorithm? a) Symmetric-key cryptography a) Symmetric-key cryptography b) Asymmetric-key cryptography b) Asymmetric-key cryptography c) Hash functions c) Hash functions d) Digital signatures d) Digital signatures #29. 29. The Advanced Encryption Standard (AES) supports key lengths of: a) 64 bits a) 64 bits b) 128 bits b) 128 bits c) 256 bits c) 256 bits d) b & c d) b & c #30. 30. The process of securely storing passwords by adding random data before hashing is known as: a) Encryption a) Encryption b) Salting b) Salting c) Key stretching c) Key stretching d) Decryption d) Decryption #31. 1. What is Cryptography? a) The study of secret societies a) The study of secret societies b) The art of writing in code or cipher b) The art of writing in code or cipher c) The science of predicting the future c) The science of predicting the future d) The analysis of ancient scripts d) The analysis of ancient scripts #32. 2. Which of the following is NOT a primary goal of cryptography? a) Confidentiality a) Confidentiality b) Integrity b) Integrity c) Availability c) Availability d) Authentication d) Authentication #33. 3. In symmetric-key cryptography, the same key is used for: a) Encryption and decryption a) Encryption and decryption b) Encryption only b) Encryption only c) Decryption only c) Decryption only d) None of the above d) None of the above #34. 4. The process of converting plaintext into ciphertext using a cryptographic algorithm and key is known as: a) Decryption a) Decryption b) Hashing b) Hashing c) Encryption c) Encryption d) Salting d) Salting #35. 5. The DES (Data Encryption Standard) algorithm is an example of: a) Symmetric-key cryptography a) Symmetric-key cryptography b) Asymmetric-key cryptography b) Asymmetric-key cryptography c) Hybrid cryptography c) Hybrid cryptography d) Quantum cryptography d) Quantum cryptography #36. 6. Which algorithm is commonly used for secure data transmission over the internet, providing confidentiality and integrity? a) AES (Advanced Encryption Standard) a) AES (Advanced Encryption Standard) c) DES (Data Encryption Standard) c) DES (Data Encryption Standard) d) MD5 (Message Digest Algorithm 5) d) MD5 (Message Digest Algorithm 5) #37. 7. The key exchange problem in symmetric-key cryptography refers to: a) Selecting appropriate encryption keys a) Selecting appropriate encryption keys b) Exchanging keys securely between parties b) Exchanging keys securely between parties c) Decrypting ciphertext without the key c) Decrypting ciphertext without the key d) Generating random numbers for encryption d) Generating random numbers for encryption #38. 8. In asymmetric-key cryptography, how many keys are used for encryption and decryption? a) One a) One b) Two b) Two c) Three c) Three d) Four d) Four #39. 9. The Diffie-Hellman key exchange algorithm is used for: a) Digital signatures a) Digital signatures b) Public-key encryption b) Public-key encryption c) Key exchange c) Key exchange d) Symmetric encryption d) Symmetric encryption #40. 10. Which asymmetric algorithm is commonly used for digital signatures and secure communication? a) AES a) AES b) RSA (for Digital Signatures) b) RSA (for Digital Signatures) c) ECC (Elliptic Curve Cryptography) c) ECC (Elliptic Curve Cryptography) d) Blowfish d) Blowfish #41. 11. Public keys are used for: a) Encrypting messages a) Encrypting messages b) Decrypting messages b) Decrypting messages c) Both encrypting and decrypting messages c) Both encrypting and decrypting messages d) Signing messages d) Signing messages #42. 12. Private keys in asymmetric cryptography are kept: a) Publicly shared a) Publicly shared b) Only on the sender's computer b) Only on the sender's computer c) Only on the recipient's computer c) Only on the recipient's computer d) Secret and known only to the key owner d) Secret and known only to the key owner #43. 13. Which cryptographic hash function is commonly used for ensuring data integrity? a) SHA-1 (Secure Hash Algorithm 1) a) SHA-1 (Secure Hash Algorithm 1) b) MD5 b) MD5 c) SHA-256 c) SHA-256 d) HMAC (Hash-based Message Authentication Code) d) HMAC (Hash-based Message Authentication Code) #44. 14. A digital signature is used to: a) Encrypt messages a) Encrypt messages b) Authenticate the sender b) Authenticate the sender c) Exchange symmetric keys c) Exchange symmetric keys d) Hash data for storage d) Hash data for storage #45. 15. The process of verifying the integrity of a message without revealing its content is achieved through: a) Encryption a) Encryption b) Digital signatures b) Digital signatures c) Hash functions c) Hash functions d) Key exchange d) Key exchange #46. 16. Which of the following is a weakness of symmetric-key cryptography? a) Slow key generation a) Slow key generation b) Key distribution problem b) Key distribution problem c) Limited key lengths c) Limited key lengths d) Dependence on public keys d) Dependence on public keys #47. 17. The concept of a "man-in-the-middle" attack is a concern for: a) Symmetric-key cryptography a) Symmetric-key cryptography b) Asymmetric-key cryptography b) Asymmetric-key cryptography c) Hash functions c) Hash functions d) Key exchange protocols d) Key exchange protocols #48. 18. Which algorithm is commonly used for securely transmitting passwords over a network? a) RSA a) RSA b) Diffie-Hellman b) Diffie-Hellman c) SHA-256 c) SHA-256 d) Blowfish d) Blowfish #49. 19. The process of converting ciphertext back to plaintext is known as: a) Hashing a) Hashing b) Decryption b) Decryption c) Encryption c) Encryption d) Salting d) Salting #50. 20. In the RSA algorithm, the security is based on the difficulty of: a) Prime factorization a) Prime factorization b) Hash collisions b) Hash collisions c) Symmetric key generation c) Symmetric key generation d) One-way functions d) One-way functions #51. 21. Which cryptographic concept is the basis for secure communication over an insecure channel? a) Public-key cryptography (aka. Asymmetric cryptography) a) Public-key cryptography (aka. Asymmetric cryptography) b) Symmetric-key cryptography b) Symmetric-key cryptography c) Digital signatures c) Digital signatures d) Hash functions d) Hash functions #52. 22. What is the primary purpose of a nonce (number used once) in cryptography? a) Ensuring data integrity a) Ensuring data integrity b) Preventing replay attacks b) Preventing replay attacks c) Generating random keys c) Generating random keys d) Hashing passwords d) Hashing passwords #53. 23. Elliptic Curve Cryptography (ECC) is known for: a) High key lengths a) High key lengths b) Slow encryption speed b) Slow encryption speed c) Strong security with shorter keys c) Strong security with shorter keys d) Symmetric key generation d) Symmetric key generation #54. 24. Which key length is considered more secure in modern cryptographic algorithms? a) 32 bits a) 32 bits b) 64 bits b) 64 bits c) 128 bits c) 128 bits d) 256 bits d) 256 bits #55. 25. The process of obscuring data to make it unreadable without special knowledge is called: a) Decryption a) Decryption b) Encryption b) Encryption c) Hashing c) Hashing d) Salting d) Salting #56. 26. Which algorithm is commonly used for generating digital signatures and creating a secure hash? a) RSA a) RSA b) HMAC b) HMAC c) DSA (Digital Signature Algorithm) c) DSA (Digital Signature Algorithm) d) MD5 d) MD5 #57. 27. The process of adding random data to a message before hashing is known as: a) Encryption a) Encryption b) Salting b) Salting c) Key exchange c) Key exchange d) Decryption d) Decryption #58. 28. The concept of a "trapdoor function" is associated with which type of cryptographic algorithm? a) Symmetric-key cryptography a) Symmetric-key cryptography b) Asymmetric-key cryptography b) Asymmetric-key cryptography c) Hash functions c) Hash functions d) Digital signatures d) Digital signatures #59. 29. The Advanced Encryption Standard (AES) supports key lengths of: a) 64 bits a) 64 bits b) 128 bits b) 128 bits c) 256 bits c) 256 bits d) b & c d) b & c #60. 30. The process of securely storing passwords by adding random data before hashing is known as: a) Encryption a) Encryption b) Salting b) Salting c) Key stretching c) Key stretching d) Decryption d) Decryption Finish