0

Cryptography and Hashing

Description: Cryptography and Hashing Quiz
Number of Questions: 15
Created by:
Tags: cryptography hashing encryption decryption
Attempted 0/15 Correct 0 Score 0

What is the process of converting plaintext into ciphertext called?

  1. Encryption

  2. Decryption

  3. Hashing

  4. Encoding


Correct Option: A
Explanation:

Encryption is the process of converting plaintext into ciphertext, which is unreadable without the appropriate key.

What is the process of converting ciphertext back into plaintext called?

  1. Encryption

  2. Decryption

  3. Hashing

  4. Decoding


Correct Option: B
Explanation:

Decryption is the process of converting ciphertext back into plaintext, which is readable without the appropriate key.

What is a cryptographic hash function?

  1. A function that takes an input of any size and produces an output of a fixed size

  2. A function that takes an input of a fixed size and produces an output of any size

  3. A function that takes an input of any size and produces an output of the same size

  4. A function that takes an input of a fixed size and produces an output of the same size


Correct Option: A
Explanation:

A cryptographic hash function is a function that takes an input of any size and produces an output of a fixed size, which is called a hash value or message digest.

What is the purpose of a cryptographic hash function?

  1. To ensure the integrity of data

  2. To provide confidentiality for data

  3. To provide authentication for data

  4. To provide non-repudiation for data


Correct Option: A
Explanation:

The purpose of a cryptographic hash function is to ensure the integrity of data by generating a unique and fixed-size hash value for the data.

Which of the following is a common cryptographic hash function?

  1. MD5

  2. SHA-1

  3. SHA-256

  4. SHA-512


Correct Option: C
Explanation:

SHA-256 is a common cryptographic hash function that produces a 256-bit hash value.

What is the difference between symmetric and asymmetric cryptography?

  1. Symmetric cryptography uses the same key for encryption and decryption, while asymmetric cryptography uses different keys for encryption and decryption.

  2. Symmetric cryptography uses different keys for encryption and decryption, while asymmetric cryptography uses the same key for encryption and decryption.

  3. Symmetric cryptography is more secure than asymmetric cryptography.

  4. Asymmetric cryptography is more secure than symmetric cryptography.


Correct Option: A
Explanation:

Symmetric cryptography uses the same key for encryption and decryption, while asymmetric cryptography uses different keys for encryption and decryption.

Which of the following is a common symmetric cryptography algorithm?

  1. AES

  2. DES

  3. RSA

  4. ECC


Correct Option: A
Explanation:

AES (Advanced Encryption Standard) is a common symmetric cryptography algorithm that is used to encrypt and decrypt data.

Which of the following is a common asymmetric cryptography algorithm?

  1. AES

  2. DES

  3. RSA

  4. ECC


Correct Option: C
Explanation:

RSA (Rivest-Shamir-Adleman) is a common asymmetric cryptography algorithm that is used to encrypt and decrypt data.

What is a digital signature?

  1. A unique identifier for a digital document

  2. A mathematical algorithm used to encrypt data

  3. A method for verifying the integrity of a digital document

  4. A way to securely transmit data over a network


Correct Option: C
Explanation:

A digital signature is a method for verifying the integrity of a digital document by using a cryptographic hash function and a private key.

What is a certificate authority (CA)?

  1. An organization that issues digital certificates

  2. A government agency that regulates the use of cryptography

  3. A company that provides encryption services

  4. A non-profit organization that promotes the use of cryptography


Correct Option: A
Explanation:

A certificate authority (CA) is an organization that issues digital certificates, which are used to verify the identity of a website or an individual.

What is the purpose of a public key infrastructure (PKI)?

  1. To provide a secure way to exchange keys between parties

  2. To provide a way to verify the identity of a website or an individual

  3. To provide a way to encrypt and decrypt data

  4. To provide a way to generate digital signatures


Correct Option: A
Explanation:

The purpose of a public key infrastructure (PKI) is to provide a secure way to exchange keys between parties.

What is the difference between a block cipher and a stream cipher?

  1. A block cipher encrypts data in blocks of a fixed size, while a stream cipher encrypts data in a continuous stream.

  2. A block cipher encrypts data in a continuous stream, while a stream cipher encrypts data in blocks of a fixed size.

  3. A block cipher is more secure than a stream cipher.

  4. A stream cipher is more secure than a block cipher.


Correct Option: A
Explanation:

A block cipher encrypts data in blocks of a fixed size, while a stream cipher encrypts data in a continuous stream.

Which of the following is a common block cipher algorithm?

  1. AES

  2. DES

  3. RSA

  4. ECC


Correct Option: A
Explanation:

AES (Advanced Encryption Standard) is a common block cipher algorithm that is used to encrypt and decrypt data.

Which of the following is a common stream cipher algorithm?

  1. AES

  2. DES

  3. RC4

  4. Salsa20


Correct Option: C
Explanation:

RC4 (Rivest Cipher 4) is a common stream cipher algorithm that is used to encrypt and decrypt data.

What is the difference between a one-way hash function and a cryptographic hash function?

  1. A one-way hash function is irreversible, while a cryptographic hash function is reversible.

  2. A one-way hash function is reversible, while a cryptographic hash function is irreversible.

  3. A one-way hash function is more secure than a cryptographic hash function.

  4. A cryptographic hash function is more secure than a one-way hash function.


Correct Option: A
Explanation:

A one-way hash function is irreversible, while a cryptographic hash function is reversible.

- Hide questions