Cryptographic Building Blocks Quiz

Cryptographic Building Blocks Quiz

University

10 Qs

quiz-placeholder

Similar activities

TAC3121-Quiz 3

TAC3121-Quiz 3

University

10 Qs

Security

Security

12th Grade - University

12 Qs

Assignment6

Assignment6

University

10 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Authentication Quiz

Authentication Quiz

11th Grade - University

15 Qs

QuizChapter2

QuizChapter2

University

11 Qs

CNS QUIZ

CNS QUIZ

University

14 Qs

Message Authentication Code

Message Authentication Code

University

13 Qs

Cryptographic Building Blocks Quiz

Cryptographic Building Blocks Quiz

Assessment

Quiz

Computers

University

Hard

Created by

NOOR ABIR

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of stream ciphers?

Generate authentication tags

Provide confidentiality

Ensure data integrity

Encrypt fixed-length blocks

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm uses a 16-round Feistel network?

Triple-DES

Data Encryption Standard (DES)

Electronic Codebook (ECB)

Advanced Encryption Standard (AES)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main security goal of Message Authentication Codes (MACs)?

Indistinguishability under adaptive chosen ciphertext attack

Integrity and data origin authentication

Existential unforgeability under chosen message attack

Confidentiality of data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of function generates a binary string that is indistinguishable from random?

Hash Functions

Message Authentication Codes

Pseudorandom Functions

Symmetric Cryptography

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary use of Hash Functions?

Generate authentication tags

Ensure data integrity

Provide confidentiality

Hash an arbitrary length binary string into a fixed length binary string

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mode of operation is suitable for streaming media and disk encryption?

Block ciphers vs. stream ciphers

Electronic Codebook (ECB) mode

Cipher Block Chaining (CBC) mode

Modes of operation

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the impact of Quantum Grover search on key length?

Halves the key length

Does not affect the key length

Increases the key length by 25%

Doubles the key length

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?