Search Header Logo

Cryptography A Levels

Authored by Ryan Coughlin

Computers

9th - 12th Grade

Used 1+ times

Cryptography A Levels
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

44 questions

Show all answers

1.

DRAG AND DROP QUESTION

1 min • 1 pt

An ​ (a)   is a another name for a hacker that maliciously reads data sent over a ​ (b)   network.

eavesdropper
public
phisher
private
transmitted
feline

2.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   is where only the intended recipient should be able to read or decipher the data.

​ (b)   is the need to identify who sent the data and verify that the source is legitimate.

​ (c)   is that data should reach its destination without any changes.

​ (d)   is that neither the sender nor the recipient should be able to deny that they were part of the data transmission which just took place.

Confidentiality
Authenticity
Integrity
Non-repudiation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which is more secure, block cipher or stream cipher?

block cipher

stream cipher

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Media Image

Why is a block cipher more secure than a stream cipher?

Evaluate responses using AI:

OFF

Answer explanation

A block cipher is more secure than a stream cipher because it is more difficult to break. A stream cipher encrypts data in a continuous fashion, which makes it easier to decrypt. However, a block cipher encrypts data into blocks, which makes it more difficult to decrypt.

With block cipher, each plaintext block is XORed with the previous ciphertext block and then encrypted – this is known as block chaining. This prevents identical blocks of plaintext producing the same ciphertext each time they are encrypted

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is the key distribution problem most an issue for?

symmetric encryption

asymmetric encryption

digital certificate

digital signature

Answer explanation

One issue with symmetric encryption is that both sender and recipient need to use the same secret key. This is a security risk here, since the sender has to supply the key to the recipient. This key could be intercepted. This is referred to as the key distribution problem.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Quantum cryptography uses the physical properties of ______ to exchange keys.

Answer explanation

Quantum cryptography uses the physical properties of photons to exchange keys.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What does QKD mean?

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?