Secrypt

A vibrant and modern illustration depicting various cryptographic symbols, algorithms, and a digital lock to represent security and encryption.

Secrypt: The Ultimate Cryptography Quiz

Test your knowledge of cryptography with our comprehensive quiz designed for enthusiasts and professionals alike. Dive into topics ranging from basic encryption techniques to advanced algorithms.

  • 25 engaging multiple-choice questions
  • Challenge yourself and learn new facts
  • Ideal for students, educators, and cybersecurity aficionados
25 Questions6 MinutesCreated by DecryptingFox450
What do cryptographic systems aim to provide?
Authentication, Authorisation and Accounting
Confidentiality, Integrity, Non Repudiation and Authentication
Public Key Cryptography
Secure Communication
Public Key Cryptography
What is 12 mod 5?
7
2
10
3
What is 5 mod 6
1
5
-1
2
How many possible combinations are there in a Caesar Cipher
26
25
23
17
What is the second most frequent letter in the English alphabet?
E
A
T
I
ROT-13 is a type of substitution cipher?
Teue
False
What type of encryption standard is a substitution Cipher typically used in?
DES
AES
Caesar
Hashing
What is the purpose of IOC (Index of Coincidence)?
To identify spikes that can be used to identify the Key length
To identify how frequent a letter appears
To see the coincidence of letters in the ciphertext
To index string patterns to show the key length
The purpose of frequency analysis is to show how frequent a letter is in the original text
True
False
What happens when you XOR two ciphertext objects (images) with the same key
The images are further protected
The key will cancel itself out exposing the ciphertexts
The images corrupt
The XOR operation will encrypt the images using AES encryption standard
Why is the one-time pad solution impractical in some cases?
As the key length matches the message, shorter key lengths become vulnerable
A large key length is not practical with large sizes
The key can only be used once
How would you make a transposition based cipher with the plaintext "I AM A LUMBERJACK I AM OKAY I DO SAY"
You use Caesar cipher to shift the letters by x amount of places
You create a grid size with x amount of columns to encrypt the message and similarly use the key (x amount of columns) to decrypt
You create a monoalphabetic substitution cipher mapping the characters to any letter of the alphabet
Stream ciphers encrypt each byte in blocks?
False
True
Which symmetric encryption standard is deemed more secure?
AES
DES
RC4
MD5
Why is Electronic Codebook Mode (ECB) used?
Because it provides a more complex approach
Simplest, most natural approach, also the most efficient
Uses an Initialisation Vector
What is fed into the block cipher and ciphered with the key when using Counter Mode encryption (CTR mode encryption)?
Counter and IV
Counter and Ciphertext
Counter and Nonce
Counter and Key
Why was Cipher Block Chaining Mode introduced (CBC)? (select 2)
CBC removes dependency
It uses an Initialisaiton Vector being unique for a particular key
It uses OFB mode encryption
It uses CFB mode encryption
Asymmetric ciphers require one key for encrypting and decrypting?
True
False
What is Phi(25)?
12
24
25
20
16 is congruent to 4 mod 12?
True
False
A hash function is:
Two-way encryption
MD5
One-way encryption
SHA-1
What is deemed the most secure hash function to date?
MD5
SHA-256
SHA-3
GOST-3411
Which applications is true about hash functions: (select 2)
Password logins
Online cookies
Digital signatures
Identification of hardware
What does RSA do?
Verifies the message signatures with hashes
Creates an MD5 hash
Creates a onw-way hash function
Creates padding on the hash
How do we test randomness?
Rio Test
Uniformity Test
Random number Generator
Pseudo-random number generator
{"name":"Secrypt", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of cryptography with our comprehensive quiz designed for enthusiasts and professionals alike. Dive into topics ranging from basic encryption techniques to advanced algorithms.25 engaging multiple-choice questionsChallenge yourself and learn new factsIdeal for students, educators, and cybersecurity aficionados","img":"https:/images/course6.png"}
Powered by: Quiz Maker