Search Header Logo

Cryptology Basics Quiz

Authored by Susan Pullen

Mathematics

11th Grade

CCSS covered

Used 4+ times

Cryptology Basics Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Key Exchange Problem refers to:

The difficulty of securely transmitting a symmetric encryption key over an insecure channel

The challenge of creating a long enough encryption key

The need to frequently change encryption keys

The risk of losing encryption keys

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Diffie-Hellman Key Exchange is used to:

Encrypt messages directly

Securely exchange symmetric keys over an insecure channel

Generate digital signatures

Encrypt passwords for storage

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mathematical operation is fundamental to the security of Diffie-Hellman?

Multiplication of prime numbers

Modular exponentiation

Addition of large numbers

Matrix multiplication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. RSA encryption is based on:

The difficulty of solving the discrete logarithm problem

The difficulty of factoring large prime numbers

The unpredictability of elliptic curves

The efficiency of symmetric key encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between symmetric and asymmetric encryption?

Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses a public and a private key

Asymmetric encryption is always faster than symmetric encryption

Symmetric encryption is only used for securing passwords, while asymmetric encryption is used for all other purposes

Asymmetric encryption does not require keys at all

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Before public-key cryptography, how were encryption keys typically exchanged?

Through a trusted courier or physical delivery

Using an unsecured email system

By embedding the key directly into the encrypted message

Encryption keys did not exist before the 1970s

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a correct conversion of the binary number 1011 to decimal?

9

10

11

12

Tags

CCSS.2.NBT.A.3

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?