Cryptography OA PRACTICE TEST
2025/2026 COMPLETE QUESTIONS BANK
WITH VERIFIED CORRECT ANSWERS||
100% GUARANTEED PASS
<RECENT VERSION>
1. Playfair Cipher - ANSWER ✔ Uses a 5x5 grid built from a secret phrase
with no repeating letters (e.g., "napierrun")
2. Playfair Grid Note - ANSWER ✔ The letters "I" and "J" are treated as the
same letter to maintain the 25-letter grid
3. Homophonic Substitution Cipher - ANSWER ✔ Replaces each plaintext
letter with multiple possible cipher texts to disguise frequency patterns
4. Little Endian - ANSWER ✔ A memory storage format where the least
significant byte is stored at the lowest memory address
5. Systems Using Little Endian - ANSWER ✔ Most PC systems with Intel
processors follow the Little Endian architecture
6. Big Endian - ANSWER ✔ A memory storage format where the most
significant byte is stored at the lowest memory address
7. Systems Using Big Endian - ANSWER ✔ Commonly used in IBM
z/Architecture mainframes
,8. Integer - ANSWER ✔ A number that can be positive or negative with no
fractional part (e.g., -3, 0, 7)
9. Rational Number - ANSWER ✔ A number that can be expressed as a
fraction, such as ¾
10.Real Number - ANSWER ✔ Includes both integers and rational numbers
(e.g., 2.3)
11.Prime Number - ANSWER ✔ A positive integer greater than 1 that is only
divisible by 1 and itself
12.Natural Number - ANSWER ✔ A positive integer used for counting (e.g., 1,
5, 16)
13.Example of Overlap - ANSWER ✔ A number like 3 is both a natural
number and a prime number
14.XOR (Exclusive OR) - ANSWER ✔ Outputs 1 only if one of the bits is 1,
not both. Otherwise, the result is 0 (e.g., 11010 XOR 01011 = 10001)
15.OR - ANSWER ✔ Outputs 1 if at least one of the bits is 1. Only outputs 0
when both bits are 0 (e.g., 11111 OR 01011 = 11111)
16.AND - ANSWER ✔ Outputs 1 only if both bits are 1. Otherwise, the result
is 0 (e.g., 10010 AND 01011 = 00010)
17.Mod Operator - ANSWER ✔ Provides the remainder of an integer division.
Common in prime-based operations (e.g., 17 mod 5 = 2)
18.Shift Operators - ANSWER ✔ Moves bits left or right (rotation), altering the
bit pattern. For example, 1010 shifted left becomes 1000
19.PRNGs (Pseudo-Random Number Generators) - ANSWER ✔ Repeats the
random numbers after a given time (periodic); they are fast and deterministic
,20.TRNGs (True Random Number Generators) - ANSWER ✔ Use real-world
randomness (e.g., mouse movements) for true unpredictability
21.Monoalphabetic Cipher - ANSWER ✔ A substitution cipher where each
plaintext letter is always replaced with the same corresponding ciphertext
letter (e.g., Caesar cipher with A → D)\n\n
22.Polyalphabetic Cipher - ANSWER ✔ A cipher that uses multiple alphabets
to encode the plaintext, making it harder to crack (e.g., Vigenère cipher)
23.Enigma Cipher Machine - ANSWER ✔ A polyalphabetic cipher that didn't
repeat within a reasonable time and used a secret key; weakness: a letter
could never encrypt to itself
24.Asymmetric Encryption - ANSWER ✔ Uses a public key to encrypt and a
private key to decrypt; enables secure sharing without exchanging secrets
25.Public Key - ANSWER ✔ Freely distributed; used to encrypt messages in
asymmetric encryption
26.Private Key - ANSWER ✔ Kept secret; used to decrypt messages in
asymmetric encryption
27.Symmetric Encryption - ANSWER ✔ Uses a single shared key to both
encrypt and decrypt data
28.Shared Secret Key - ANSWER ✔ The term used to describe the one key
used in symmetric encryption
29.Frequency Analysis - ANSWER ✔ Analyzes cipher text to identify patterns
and compare them to standard English character frequencies
30.Cryptography - ANSWER ✔ The science of keeping information secret by
converting data into a secure format using algorithms
31.Cryptanalysis - ANSWER ✔ The art of breaking or cracking cryptographic
protections through algorithm analysis
, 32.Cryptology - ANSWER ✔ The study and practice of both cryptography and
cryptanalysis
33.Plaintext - ANSWER ✔ A human-readable, unencrypted message used as
input before encryption or after decryption
34.Ciphertext - ANSWER ✔ An unreadable, encrypted message produced after
applying an encryption algorithm to plaintext
35.RSA leverages - ANSWER ✔ the fact that products of large prime numbers
are difficult to factorize as basis of its encryption.
36.Homomorphic Encryption - ANSWER ✔ can perform mathematical
operations on ciphered values i.e., before decryption.
37.RSA has a heavy overhead - ANSWER ✔ on processor loading and is not
well suited for embedded systems (as the power drain can be high, along
with heavy requirements for processing and memory).
38.An improved solution over RSA is - ANSWER ✔ Elliptic Curve which is
often used in key exchange methods (such as with Elliptic Curve Diffie
Hellman - ECDH) and for the creation of digital signatures (Elliptic Curve
Digital Signature Algorithm - ECDSA)
39.The main advantages of Elliptic Curve methods are: - ANSWER ✔ ▪ Much
smaller keys. The prime number P is normally only 160 bits, and much
smaller than in RSA. This considerably speeds up the encryption process.
40.▪ Creation of the curves are more difficult than generating prime numbers,
which makes it more difficult to crack than RSA.
41.▪ They can be used to factorize values, such as finding the prime number
factors within RSA.
42.Bitcoins use Elliptic Curve cryptography - ANSWER ✔ with 32-byte private
keys (which is a random number) and 64-byte public keys, on a secp256k1
curve.