
Cryptography A Levels
Authored by Ryan Coughlin
Computers
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
44 questions
Show all answers
1.
DRAG AND DROP QUESTION
1 min • 1 pt
An (a) is a another name for a hacker that maliciously reads data sent over a (b) network.
2.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) is where only the intended recipient should be able to read or decipher the data.
(b) is the need to identify who sent the data and verify that the source is legitimate.
(c) is that data should reach its destination without any changes.
(d) is that neither the sender nor the recipient should be able to deny that they were part of the data transmission which just took place.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is more secure, block cipher or stream cipher?
block cipher
stream cipher
4.
OPEN ENDED QUESTION
3 mins • 1 pt
Why is a block cipher more secure than a stream cipher?
Evaluate responses using AI:
OFF
Answer explanation
A block cipher is more secure than a stream cipher because it is more difficult to break. A stream cipher encrypts data in a continuous fashion, which makes it easier to decrypt. However, a block cipher encrypts data into blocks, which makes it more difficult to decrypt.
With block cipher, each plaintext block is XORed with the previous ciphertext block and then encrypted – this is known as block chaining. This prevents identical blocks of plaintext producing the same ciphertext each time they are encrypted
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which is the key distribution problem most an issue for?
symmetric encryption
asymmetric encryption
digital certificate
digital signature
Answer explanation
One issue with symmetric encryption is that both sender and recipient need to use the same secret key. This is a security risk here, since the sender has to supply the key to the recipient. This key could be intercepted. This is referred to as the key distribution problem.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Quantum cryptography uses the physical properties of ______ to exchange keys.
Answer explanation
Quantum cryptography uses the physical properties of photons to exchange keys.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What does QKD mean?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
45 questions
TJBL WAN KLS 11 SINIU
Quiz
•
11th Grade
40 questions
C++ Programming
Quiz
•
9th - 12th Grade
40 questions
Đề cương HKII Tin (tmt:>)
Quiz
•
11th Grade
43 questions
Data Representation Unit
Quiz
•
9th - 11th Grade
47 questions
Tin11-gk2
Quiz
•
11th Grade
42 questions
Digital and Information Systems (VAC)
Quiz
•
12th Grade
45 questions
Davinci Resolve 17 Fusion 101
Quiz
•
11th Grade - Professi...
40 questions
WJEC ICT Unit 3 Mock Revision
Quiz
•
10th - 11th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade