Common Cryptography Techniques in Use Flashcards
Which of the following is a widely used symmetric encryption algorithm?
A) RSA
B) ECC
C) AES
D) DSA
C) AES
Which cryptographic technique is primarily used for securing email communication in the UK?
A) PGP (Pretty Good Privacy)
B) DES (Data Encryption Standard)
C) SHA-256 (Secure Hash Algorithm)
D) Blowfish
A) PGP (Pretty Good Privacy)
What does the acronym ‘RSA’ stand for in cryptography?
A) Rivest-Shamir-Adleman
B) Randomized Security Algorithm
C) Robust Security Application
D) Reliable Secure Algorithm
A) Rivest-Shamir-Adleman
Which hashing algorithm is recommended by the UK’s National Cyber Security Centre (NCSC) for ensuring data integrity?
A) MD5
B) SHA-1
C) SHA-256
D) RC4
C) SHA-256
Elliptic Curve Cryptography (ECC) is known for:
A) Being faster than symmetric encryption algorithms
B) Providing security with smaller key sizes compared to other algorithms
C) Being outdated and insecure
D) Only being used for hashing
B) Providing security with smaller key sizes compared to other algorithms
Which of the following encryption methods is considered outdated and insecure?
A) AES
B) RSA
C) DES
D) ECC
C) DES
What is the primary purpose of a digital signature in cryptography?
A) To encrypt data for secure transmission
B) To compress data to save storage space
C) To verify the authenticity and integrity of a message
D) To generate random numbers for cryptographic operations
C) To verify the authenticity and integrity of a message
Which of the following is an example of asymmetric encryption?
A) AES
B) RSA
C) DES
D) Blowfish
B) RSA
TLS (Transport Layer Security) primarily uses which type of cryptography to establish a secure connection?
A) Symmetric cryptography only
B) Asymmetric cryptography only
C) A combination of both symmetric and asymmetric cryptography
D) Hashing algorithms only
C) A combination of both symmetric and asymmetric cryptography
Which cryptographic technique is used to ensure data integrity by producing a unique fixed-size string from input data?
A) Symmetric encryption
B) Asymmetric encryption
C) Hashing
D) Key exchange
C) Hashing
Which encryption algorithm is commonly used in securing Wi-Fi networks?
A) RSA
B) WPA2 (using AES)
C) ECC
D) MD5
B) WPA2 (using AES)
Which protocol is often used for secure web browsing in the UK?
A) HTTP
B) FTP
C) SMTP
D) HTTPS
D) HTTPS
In cryptography, what does the term ‘key exchange’ refer to?
A) Encrypting data with a symmetric key
B) Decrypting data with a public key
C) The process of sharing encryption keys between parties
D) Hashing a message for integrity
C) The process of sharing encryption keys between parties
Which of the following cryptographic protocols is designed to provide secure email services?
A) SSH
B) S/MIME
C) FTP
D) Telnet
B) S/MIME
What is the primary advantage of using elliptic curve cryptography (ECC) over RSA?
A) ECC is faster than RSA for all operations
B) ECC requires smaller key sizes to achieve similar security levels as RSA
C) ECC is older and more trusted than RSA
D) ECC uses symmetric keys
B) ECC requires smaller key sizes to achieve similar security levels as RSA