ThatQuiz Test Library Take this test now
Cryptography - Test
Contributed by: Skelton
  • 1. Cryptography is the practice and study of techniques for secure communication in the presence of third parties. It involves creating and analyzing protocols that prevent third parties or the public from reading private messages. Various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are enabled by cryptographic techniques. Cryptography is essential for securing sensitive information in sectors such as government, finance, healthcare, and communication networks. Modern cryptography employs algorithms and mathematical principles to ensure data protection, confidentiality, and privacy.

    Which type of cryptography uses the same key for both encryption and decryption?
A) Symmetric cryptography
B) Quantum cryptography
C) Asymmetric cryptography
D) Hashing algorithms
  • 2. What does the term 'plaintext' refer to in cryptography?
A) Unencrypted data
B) Digital signatures
C) Public keys
D) Encrypted data
  • 3. What is a 'cipher' in cryptography?
A) Algorithm for encryption and decryption
B) Hardware security module
C) Secure network protocol
D) Public key infrastructure
  • 4. Which of the following is a form of asymmetric cryptography?
A) AES
B) Blowfish
C) RSA
D) Triple DES
  • 5. Which cryptographic primitive is used for generating a fixed-size hash of data?
A) Public key encryption
B) Symmetric key encryption
C) Hash function
D) Key exchange algorithm
  • 6. What is the term for the process of converting plaintext into ciphertext?
A) Hashing
B) Key exchange
C) Encryption
D) Decryption
  • 7. What is the process of securely exchanging cryptographic keys called?
A) Public key encryption
B) Key exchange
C) Digital signing
D) Hashing
  • 8. What is the process of converting ciphertext back into plaintext called?
A) Key exchange
B) Encryption
C) Hashing
D) Decryption
  • 9. Which cryptographic hash function is commonly used for integrity checking?
A) MD5
B) AES
C) SHA-256
D) SHA-1
  • 10. What does PGP stand for in relation to cryptography?
A) Pretty Good Privacy
B) Public Key Globus
C) Protocol for Global Privacy
D) Private Guard Protocol
  • 11. What is the term for a weakness in a cryptographic system that can be exploited by an attacker?
A) Vulnerability
B) Salting
C) Hash
D) Key
  • 12. Which of the following is a symmetric encryption algorithm?
A) RSA
B) ECC
C) Diffie-Hellman
D) AES
  • 13. Which cryptographic protocol is commonly used to secure web traffic (HTTPS)?
A) SSL/TLS
B) PGP
C) SSH
D) IPSec
  • 14. What is the use of padding in encryption?
A) Ensuring Blocks are a Fixed Size
B) Increasing Key Length
C) Preventing Brute Force Attacks
D) Improving Compression
  • 15. What type of encryption ensures that the same plaintext message will always generate the same cipher text?
A) Public Key
B) Asymmetric
C) Probabilistic
D) Deterministic
  • 16. Which type of encryption uses two keys, one for encryption and the other for decryption?
A) Diffie-Hellman
B) Symmetric
C) Hashing
D) Asymmetric
  • 17. Which cipher involves shifting the letters of the alphabet a certain number of places?
A) AES
B) Vigenère
C) Playfair
D) Caesar
  • 18. What does HMAC stand for in cryptography?
A) Human-Machine Authorization Comparison
B) Highly Manufactured Argument Chunk
C) Hash-Based Message Authentication Code
D) Hypertext Markup Algorithm Code
  • 19. What is the term for a secret value used in symmetric encryption algorithms?
A) Salt
B) IV (Initialization Vector)
C) Hash
D) Key
  • 20. Which cipher machine was used by the Germans during World War II?
A) Colossus
B) Enigma
C) Bletchley
D) Morse
  • 21. What is the basic principle behind the security of elliptic curve cryptography?
A) The Discrete Logarithm Problem
B) The Vigenère Cipher
C) The Birthday Paradox
D) The Caesar Cipher
Created with That Quiz — the math test generation site with resources for other subject areas.