Cryptography Exam Questions with
Answers
Cryptography - Correct Answers: Scrambling information so it cannot be read; transforms information
into secure forms so unauthorized persons cannot access it.
Steganography - Correct Answers: Hides the existence of data; an image, audio, or video file can contain
hidden messages embedded in the file; achieved by dividing the data and hiding it in unused portions of
the file; may hide data in the file header fields that describe the file, between sections of the metadata.
Metadata - Correct Answers: Data used to describe the content or structure of the actual data.
Encryption - Correct Answers: Changing original text into a secret message using cryptography.
Decryption - Correct Answers: Changing a secret message back to its original form.
Plaintext - Correct Answers: Unencrypted data to be encrypted or is the output of decryption.
Ciphertext - Correct Answers: The scrambled and unreadable output of encryption.
Cleartext data - Correct Answers: Data stored or transmitted without encryption.
Cryptographic Algorithm - Correct Answers: Also called a cipher, consists of procedures based on a
mathematical formula used to encrypt and decrypt the data.
Key - Correct Answers: A mathematical value entered into the algorithm to produce ciphertext; the
reverse process uses the key to decrypt the message.
Substitution Cipher - Correct Answers: Substitutes one character for another.
, E.g., ROT13
XOR Cipher - Correct Answers: Based on the binary operation eXclusive OR that compares two bits.
LUCIANO (Without the "LU"!!) - Correct Answers: Confidentiality, Integrity, Authentication, Non-
Repudiation, Obfuscation
Confidentiality - Correct Answers: Ensures only authorized parties can view it.
Authentication - Correct Answers: Ensures sender can be verified through cryptography.
Integrity - Correct Answers: Ensures information is correct and unaltered.
Non-Repudiation - Correct Answers: Proves that a user performed an action.
Obfuscation - Correct Answers: Making something obscure or unclear.
Security through Obscurity - Correct Answers: An approach in security where virtually any system can be
made secure as long as outsiders are unaware of it or how it functions.
Cryptography can provide protection to data that resides in any of three states. - Correct Answers: Data-
in-Use, Data-in-Transit, and Data-at-Rest.
Resource vs. Security Constraint - Correct Answers: A limitation in providing strong cryptography due to
the tug-of-war between available resources (time and energy) and the security provided by
cryptography.
High Resiliency - Correct Answers: The ability to recover from resource vs security constraints.
The three categories of cryptographic algorithms - Correct Answers: Hash Algorithms, Symmetric
Cryptographic Algorithms, and Asymmetric Cryptographic Algorithms.