CRYPTO

A visually striking abstract representation of cryptography, featuring cryptographic keys, locks, and data encryption symbols in a futuristic digital style, with a color palette of blue and green.

Cryptography Challenge Quiz

Test your knowledge of cryptography with our engaging quiz! Dive into the fascinating world of cryptography, where you will explore various methods, algorithms, and principles of secure communication.

This quiz features 24 carefully crafted questions covering topics like symmetric and asymmetric encryption, hash functions, and cryptographic protocols. Prepare to challenge yourself!

  • 24 Multiple Choice and Checkbox Questions
  • Learn about different cryptographic concepts
  • Perfect for students, educators, and enthusiasts
24 Questions6 MinutesCreated by EncryptingDragon521
BOB P=5 G=2
4
3
2
7
Which generates a shared key
Symetric
Diffie Hellman
Asymetric
Hash
Affine Cipher N=24
192
168
172
146
RSA P=3 Q=5 D=13
4
2
6
3
Public vs Symetric
Public keys more efficient
Public key uses more keys
Symetric keys shorter encryption
Public Based on mathematicl problem
What does Cryptography not deal with
Authentication
Complexity
Integrity
Secrecy
Which crytpoanalysis attack is passive
Replay
Creating new messages
Blocking messages
Modifying messages
Listening
Properties of a crypto hash
Hash cannot be computed without key
Deterministic mapping
Collision resistant
Key revocation
Difficulty of finding an input
One to one mapping
Best definition of cryptography
Combination of both encryption and decryption
A set of methods for decrypting ciphertexts
The science and art of transforming messages
A method of transforming plaintext to ciphertext
CEASER CIPHER VWDBKRPH
COVID19
LOCKDOWN
SAVEME
STAYHOME
Which are correct
XORing a random sequence
All of the group generators are prime
Equivlance of ap-1 = mod p
AES-125 is a secure hash function using 128 bits
M XOR K Cannot be used as encryption
336 =mod 3
Cryptographic hash functions can be used for integrity checking
For a hash function H, there exists differnent messages
SHA256
Secure Hash Algorithim 256bit
Uses 2 keys
Produces irreversible hashes
Produces unique hashes
Diffie Hellman Protocol
Can be used by 1 person only
Key exchange between 2 parties
Allows both to use a public key to encrypt and decrypt via symmetric cryptography
Allows both to use a public key to encrypt and decrypt via asymmetric cryptography
Man in the middle attack
Attacker intercepts 2 parties
Attack destroys line of communication
Attacker relays messages
Attacker hacks one party
Block Cipher
Encrypts in bits
Encrypts in blocks
Stream cipher
Encrypts byte by byte
Encrypts in blocks
Kerchoff principle
Security of a system should rely on confidentiality of both parties
Security of a system should rely on confidentiality of the underlying algorithm
Security of a system should rely on anonimity of attackers
Security of a system should rely on confidentiality of the key
Security of a system should rely on confidentiality of decryption mechanism
Symetric key
2 Key to encrypt and decrypt
1 Key to encrypt and decrypt
Asymetric key
2 Key to encrypt and decrypt
1 Key to encrypt and decrypt
Cryptography provides
Non-Repudation
Confidentiality
Integrity
Authentication
Monoalphabetic cipher
Each letter of plaintext replaced by another letter based on key
Based on subsititution with multiple substitution alphabets
Polyalphabetic cipher
Based on subsititution with multiple substitution alphabets
Each letter of plaintext replaced by another letter based on key
Hashing
1 Way operation
Removes ability to decrypt
2 Way operation
Cipher
1 Way operation
2 Way operation
Removes ability to decrypt
{"name":"CRYPTO", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge of cryptography with our engaging quiz! Dive into the fascinating world of cryptography, where you will explore various methods, algorithms, and principles of secure communication.This quiz features 24 carefully crafted questions covering topics like symmetric and asymmetric encryption, hash functions, and cryptographic protocols. Prepare to challenge yourself!24 Multiple Choice and Checkbox QuestionsLearn about different cryptographic conceptsPerfect for students, educators, and enthusiasts","img":"https:/images/course2.png"}
Powered by: Quiz Maker