Terminology and concepts of cryptography Flashcards

1
Q

What is the primary function of a cryptographic hash function?

A) Encrypt data
B) Decrypt data
C) Generate a unique fixed-size output from an input
D) Exchange cryptographic keys

A

C) Generate a unique fixed-size output from an input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following best describes ‘plaintext’?

A) Data that has been encrypted
B) Data in its original, unencrypted form
C) A cryptographic key
D) A type of symmetric encryption algorithm

A

B) Data in its original, unencrypted form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ‘encryption’?

A) The process of verifying the integrity of data
B) The process of converting plaintext into ciphertext
C) The process of decoding encrypted data
D) The process of generating cryptographic keys

A

B) The process of converting plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an example of a symmetric encryption algorithm?

A) RSA
B) DSA
C) AES
D) ECC

A

C) AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a ‘ciphertext’?

A) A type of symmetric key
B) Encrypted data
C) A cryptographic protocol
D) A method for key exchange

A

B) Encrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In cryptography, what does ‘key management’ refer to?

A) The process of generating encryption keys
B) The process of storing, protecting, and distributing cryptographic keys
C) The process of encrypting data
D) The process of hashing data

A

B) The process of storing, protecting, and distributing cryptographic keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ‘public key infrastructure’ (PKI)?

A) A system for managing symmetric keys
B) A framework for managing public and private keys
C) A method for encrypting emails
D) A type of cryptographic hash function

A

B) A framework for managing public and private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which term describes the process of converting ciphertext back into plaintext?

A) Encryption
B) Hashing
C) Decryption
D) Signing

A

C) Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a ‘digital certificate’?

A) A document that verifies the identity of the certificate holder
B) A type of symmetric key
C) A method for encrypting data
D) A cryptographic algorithm

A

A) A document that verifies the identity of the certificate holder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly