kIntro to Cryptography Exam Questions and Answers
k k k k k k
2023 - 2024 (Verified Answers)
k k k k
1. What type of encryption uses different keys to encrypt and decrypt them
k k k k k k k k k k k k
essage?
A Symmetric
k k
B Private key
k k k
C Secure
k
D Asymmetric ANS D
k k k
2. The most widely used asymmetric encryption algorithm is what?
k k k k k k k k
A RSA
k
B Vigenere
k k
C DES
k
D Caesar Cipher ANS A
k k k k
3. Original, unencrypted information is referred to as
k k k k k k kkkkkkk .
A text
k
,B plaintext
k k
C cleantext
k
D ciphertext ANS B
k k k
4. Which of the following is NOT an asymmetric system?
k k k k k k k k
A PGP
k k
B RSA
k k
C SSL
k
D DES ANS D
k k k
5. In order for User A to send User B an encrypted message that only User Bca
k k k k k k k k k k k k k k k k
n read, User A must encrypt message with which of the following keys?
k k k k k k k k k k k k
A User A's public key
k k k k k
B User A's private key
k k k k k
C User B's public key
k k k k
D User B's private key ANS C
k k k k k k
6. The greatest weakness with symmetric algorithms is
k k k k k k .
A They are less secure than asymmetricB
k k k k k k k k
The problem of key exchange
k k k k
,C They are slower than asymmetric D
k k k k k k k
The problem of generating keys ANS
k k k k k k
B
7. Which of the following is generally true about block sizes?
k k k k k k k k k
A Smaller block sizes increase security
k k k k k
B Block sizes must be more than 256 bits to be secureC
k k k k k k k k k k k k k
Block size is irrelevant to security
k k k k k
D Larger block sizes increase security ANS D
k k k k k k k
8. A is a function that takes a variable-
k k k k k k
size input m and returns afixed-size string.
k k k k k k k
A Symmetric cipher
k k k
B Hash
k
C Asymmetric cipher
k k k
D Feistel ANS B
k k k
9. Which of the following is a cryptographic protocol that allows two partiesto
k k k k k k k k k k k k k
establish a shared key over an insecure channel?
k k k k k k k
A Elliptic Curve
k k k
B RSA
k
C MD5
k
D Diffie-Hellman ANS D
k k k
10. A
is a digital representation of information that identifies youas a relevant e
k k k k k k k k k k k k
, ntity by a trusted third party?
k k k k k
A Digital Signature
k k k
B Hash
k
C Ownership stamp
k k k
D Digest ANS A
k k k
11. What is the standard used by most digital certificates?
k k k k k k k k
A X.509
k k
B CRL
k
C RFC 2298
k k k
D OCSP AN
k k
SA
k
12. DES uses keys of what size?
k k k k k