0% found this document useful (0 votes)
22 views5 pages

Câu hỏi quizziz

The document contains a series of questions related to cryptography, covering topics such as hash functions, symmetric and asymmetric encryption, and digital signatures. It tests knowledge on definitions, properties, and differences between various cryptographic methods and systems. Each question provides multiple-choice answers to assess understanding of cryptographic concepts.

Uploaded by

hoanglee1148
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views5 pages

Câu hỏi quizziz

The document contains a series of questions related to cryptography, covering topics such as hash functions, symmetric and asymmetric encryption, and digital signatures. It tests knowledge on definitions, properties, and differences between various cryptographic methods and systems. Each question provides multiple-choice answers to assess understanding of cryptographic concepts.

Uploaded by

hoanglee1148
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Question 1: What is a hash function?

A. An encryption algorithm used to secure information


B. A mathematical algorithm that generates a summary or hash value of a
message
C. A data compression method to reduce file size
D. A technique to encrypt messages using a secret key

Question 2: What modern cryptographic method is used to confirm the identity of


a specific message and ensure that its contents have not changed?
A. Symmetric encryption
B. Hash function
C. Digital signature
D. Steganography

Question 3: What is a fingerprint of the author’s message that is compared with


the recipient’s locally calculated hash of the same message?
A. Encryption key
B. Digital signature
C. Message digest
D. Hash functions

Question 4: What does SHS stand for in cryptography?


A. Secure Hash Standard
B. Symmetric Hashing System
C. Secure Hacking Solution
D. Standard Hashing Structure

Question 5: How many main properties does an ideal cryptographic hash function
have?
A. 1
B. 2
C. 3
D. 4

Question 6: How many keys does Symmetric Encryption require? What is it


called?
A. One key, called a private key
B. One key, called a secret key
C. Two keys, called a public and private key
D. Two keys, both called secret keys

Question 7: What is called symmetric encryption?


A. An encryption method that uses the same secret key for both encryption
and decryption.
B. An encryption method that uses a pair of public and private keys.
C. A technique that converts plaintext into an irreversible hash value.
D. A method that does not require a key for encryption or decryption.

Question 8: What are some popular symmetric encryption cryptosystems?


A. RSA, ECC, Diffie-Hellman
B. DES, 3DES, AES
C. SHA-256, MD5, HMAC
D. PGP, DSA, ElGamal

Question 9: What is the primary challenge of symmetric key encryption?


A. The encryption and decryption process is too slow.
B. It is not used in modern cryptographic systems.
C. It requires two different keys for encryption and decryption.
D. Securely sharing the secret key between sender and receiver.
Question 10: What is the difference between DES and AES?
A. DES uses a longer key length than AES.
B. DES is the successor of AES and provides stronger encryption.
C. AES is more secure and supports larger key sizes than DES.
D. AES and DES use the same key size and encryption process.

Question 11: What is the difference between symmetric and asymmetric


encryption?
A. Asymmetric encryption uses two different related keys, while symmetric
encryption uses a single key for both encryption and decryption.
B. Asymmetric encryption is more efficient in terms of CPU computations
compared to symmetric encryption.
C. Asymmetric encryption requires only one key pair for secure communication,
while symmetric encryption requires multiple key pairs.
D. Asymmetric encryption is primarily used for securing databases, while
symmetric encryption is used for digital signatures.

Question 12: What is a secret mechanism that enables you to easily accomplish
the reverse function in a one-way function?
A. Public key
B. Hash function
C. Mathematical Trapdoor
D. Digital signature

Question 13: What asymmetric encryption cryptosystem is one of the most


popular public key cryptosystems?
A. RSA (Rivest-Shamir-Adleman)
B. ECC (Elliptic Curve Cryptography)
C. DSA (Digital Signature Algorithm)
D. Diffie-Hellman

Question 14: Asymmetric algorithms are …?


A. One-way functions
B. Multi-way functions
C. Two-way functions
D. Reversible functions

Question 15: What is public-key encryption based?


A. Symmetric key encryption
B. Hash value
C. Shared secret keys
D. Hash functions

You might also like