Cryptography Quiz

Cryptography Quiz

Professional Development

10 Qs

quiz-placeholder

Similar activities

AND | AD-4421 Weighing Indicators

AND | AD-4421 Weighing Indicators

Professional Development

10 Qs

Pre-test Operational and Steam Turbine Maintenance

Pre-test Operational and Steam Turbine Maintenance

Professional Development

10 Qs

Configuring the Timeline Control and Creating Card Forms

Configuring the Timeline Control and Creating Card Forms

Professional Development

10 Qs

HIGHWAY NUMERICALS II

HIGHWAY NUMERICALS II

Professional Development

15 Qs

Database Security Quiz

Database Security Quiz

Professional Development

10 Qs

Nonwoven Fabric Basic

Nonwoven Fabric Basic

Professional Development

10 Qs

r lab

r lab

Professional Development

15 Qs

Test Quiz

Test Quiz

Professional Development

10 Qs

Cryptography Quiz

Cryptography Quiz

Assessment

Quiz

Engineering

Professional Development

Hard

Created by

Benisha s

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following correctly differentiates a stream cipher from a block cipher?

Stream ciphers encrypt fixed-size blocks, while block ciphers encrypt individual bits.

Stream ciphers operate on continuous streams of data, while block ciphers work on discrete blocks of bits.

Both encrypt fixed-size data blocks but differ in key length.

Stream ciphers and block ciphers use identical key scheduling techniques.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following stream ciphers uses a synchronous keystream generator approach?

RC4

DES

AES

Blowfish

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In symmetric key cryptography, the primary challenge is:

Large key sizes affecting computational efficiency

Secure key distribution between sender and receiver

High computational complexity of public key operations

Vulnerability to chosen-ciphertext attacks only

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which block cipher mode of operation turns a block cipher into a self-synchronizing stream cipher?

Cipher Block Chaining (CBC)

Cipher Feedback Mode (CFB)

Output Feedback Mode (OFB)

Counter Mode (CTR)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A stream cipher can be more vulnerable to which of the following if the same key is reused?

Replay attacks

Frequency analysis

Key collision attacks

Two-time pad attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The avalanche effect in block ciphers ensures:

Minor key changes produce identical ciphertexts

Small plaintext changes drastically alter ciphertext

Large plaintext changes leave ciphertext mostly unchanged

Key length does not affect ciphertext properties

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following block cipher algorithms uses a Feistel network structure?

AES

RC4

DES

ChaCha20

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?