Unit 2 - Practice Quiz

CSC203

1 What is the primary definition of Cryptography?

A. The study of writing computer viruses
B. The practice and study of techniques for secure communication in the presence of third parties
C. The process of converting hardware signals into software
D. The database management of blockchain nodes

2 In the context of cryptography, what does Plaintext refer to?

A. The encrypted data
B. The original unencrypted input data
C. The secret key used for encryption
D. The mathematical algorithm used

3 Which principle states that a cryptosystem should be secure even if everything about the system, except the key, is public knowledge?

A. Moore's Law
B. Kerckhoffs's Principle
C. Shannon's Theorem
D. Bernoulli's Principle

4 Which of the following best describes Symmetric Cryptography?

A. Sender and receiver use different keys
B. Sender uses a public key and receiver uses a private key
C. Sender and receiver share a single, common secret key
D. No keys are required for communication

5 If there are users in a network using Symmetric Cryptography, how many total keys are required for every pair of users to communicate securely?

A.
B.
C.
D.

6 Which of the following is a classic example of a Symmetric Encryption algorithm?

A. RSA
B. AES (Advanced Encryption Standard)
C. ECC (Elliptic Curve Cryptography)
D. Diffie-Hellman

7 What is the primary advantage of Symmetric Cryptography over Asymmetric Cryptography?

A. Easier key distribution
B. Provides non-repudiation natively
C. Faster computation speed
D. Supports digital signatures directly

8 In Asymmetric Cryptography, which key is used to encrypt a message intended for Bob?

A. Bob's Private Key
B. Bob's Public Key
C. The Sender's Private Key
D. The Sender's Public Key

9 What is the mathematical relationship between the Public Key () and Private Key () in a secure asymmetric system?

A. They are identical ()
B. It is computationally infeasible to derive from
C. is the inverse of divided by 2
D. They are unrelated random numbers

10 Which cryptographic primitive is primarily used to verify the integrity of data in a Blockchain?

A. Stream Cipher
B. Cryptographic Hash Function
C. Key Exchange Protocol
D. Symmetric Decryption

11 What is the Avalanche Effect in hashing?

A. A small change in input results in a drastic change in the output hash
B. The hash function gets slower as more data is processed
C. The output size grows as the input size grows
D. Collisions become more frequent over time

12 Which property of a hash function ensures that it is infeasible to find an input such that given a specific hash output ?

A. Collision Resistance
B. Pre-image Resistance
C. Second Pre-image Resistance
D. Determinism

13 What is a Hash Collision?

A. When two different inputs produce the same hash output
B. When the hash function fails to produce an output
C. When the private key is lost
D. When encryption overwrites data

14 Which hash function family is predominantly used in Bitcoin?

A. MD5
B. SHA-1
C. SHA-256
D. Keccak-256

15 What is the output length of the SHA-256 algorithm?

A. 128 bits
B. 256 bytes
C. 256 bits
D. 512 bits

16 Which cryptographic primitive allows a user to prove they know a private key without revealing it, thereby providing Non-Repudiation?

A. AES Encryption
B. Digital Signature
C. Hashing
D. Salted Hash

17 In a Digital Signature scheme, which key is used to create the signature?

A. Receiver's Public Key
B. Receiver's Private Key
C. Sender's Public Key
D. Sender's Private Key

18 What does RSA stand for?

A. Random Security Algorithm
B. Rivest-Shamir-Adleman
C. Real Secure Access
D. Recursive System Architecture

19 The security of RSA is based on the computational difficulty of which mathematical problem?

A. Discrete Logarithm Problem
B. Elliptic Curve Discrete Logarithm Problem
C. Integer Factorization of large prime products
D. Knapsack Problem

20 What is ECC in the context of cryptography?

A. Error Correcting Code
B. Elliptic Curve Cryptography
C. Encrypted Cipher Chain
D. Electronic Code Cipher

21 Why is ECC preferred over RSA in many modern blockchain systems?

A. ECC is symmetric
B. ECC provides the same security level with much smaller key sizes
C. ECC does not require mathematics
D. ECC is older and more tested than RSA

22 Which of the following describes a Block Cipher?

A. Encrypts data one bit or byte at a time continuously
B. Encrypts data in fixed-size chunks (e.g., 64 or 128 bits)
C. Does not use a key
D. Uses a physical pad for encryption

23 What is the purpose of a Nonce in cryptography and blockchain mining?

A. It is the private key
B. It is a number used only once to vary the hash output
C. It is the name of the encryption algorithm
D. It is the block size limit

24 What is Diffie-Hellman used for?

A. Digital Signatures
B. Hashing data
C. Secure Key Exchange over an insecure channel
D. File compression

25 Which of the following is a property of a Deterministic system?

A. Same input always produces the same output
B. Same input produces different outputs every time
C. Output cannot be predicted
D. Output depends on the time of day

26 The CIA Triad in information security stands for:

A. Control, Intelligence, Authorization
B. Confidentiality, Integrity, Availability
C. Code, Input, Access
D. Crypto, Identity, Algorithm

27 What is the Discrete Logarithm Problem?

A. Given and , it is hard to find
B. Given and , it is hard to find
C. It is hard to multiply two numbers
D. It is hard to sort a list of logs

28 Which attack aims to find a collision in a hash function by checking random inputs, often approximated by the Birthday Paradox?

A. Brute Force Attack
B. Birthday Attack
C. Man-in-the-Middle Attack
D. Replay Attack

29 In the context of Block Ciphers, what does ECB stand for?

A. Electronic Code Book
B. Encrypted Cipher Block
C. Elliptic Curve Basis
D. Extended Code Base

30 Which cryptographic concept ensures that a sender cannot deny having sent a message?

A. Confidentiality
B. Non-repudiation
C. Availability
D. Obfuscation

31 What is Salting in the context of password hashing?

A. Adding random data to the input before hashing
B. Encrypting the hash twice
C. Using two different hash algorithms
D. Shortening the hash output

32 Which of the following is NOT a property of a cryptographic hash function?

A. Variable output size
B. Pre-image resistance
C. Collision resistance
D. Computationally efficient

33 In Elliptic Curve Cryptography, the equation is typically of the form:

A.
B.
C.
D.

34 What is the role of a Certificate Authority (CA) in PKI (Public Key Infrastructure)?

A. To store private keys
B. To issue and verify digital certificates linking public keys to identities
C. To mine blocks in a blockchain
D. To provide internet connection

35 Which algorithm is a Stream Cipher?

A. AES
B. DES
C. RC4
D. RSA

36 What constitutes a Key Pair in blockchain wallets?

A. A username and password
B. A Private Key and a Public Key
C. Two Private Keys
D. A Hash and a Salt

37 Why is MD5 no longer recommended for cryptographic security?

A. It is too slow
B. It produces outputs that are too long
C. It has severe collision vulnerabilities
D. It requires a paid license

38 In the equation , what does represent?

A. Ciphertext
B. Key
C. Plaintext
D. Encryption Function

39 What is the key size of DES (Data Encryption Standard)?

A. 56 bits
B. 128 bits
C. 256 bits
D. 512 bits

40 Which cryptographic primitive is used to link blocks together in a Blockchain?

A. RSA Encryption
B. Hash Pointers
C. Symmetric Keys
D. Stream Ciphers

41 What is ECDSA?

A. Elliptic Curve Digital Signature Algorithm
B. Encrypted Code Data System Access
C. Electronic Cipher Digital Standard Algorithm
D. Extended Curve Data Security Act

42 If User A encrypts a message with User B's Public Key, who can decrypt it?

A. User A
B. User B
C. Both User A and User B
D. Anyone with User A's Public Key

43 What is a Merkle Tree?

A. A database of user keys
B. A binary tree of hashes used to efficiently summarize and verify data integrity
C. A type of encryption algorithm
D. A method for generating random numbers

44 Which of the following is considered Quantum-Resistant?

A. RSA-2048
B. ECC-256
C. Lattice-based Cryptography
D. Diffie-Hellman

45 What is the difference between a Weak Collision and a Strong Collision resistance?

A. Weak is for passwords, Strong is for blockchain
B. Weak relates to pre-image resistance; Strong relates to finding ANY pair of colliding inputs
C. Weak protects the public key; Strong protects the private key
D. There is no difference

46 In a symmetric cipher, if the key is intercepted by an attacker, what is compromised?

A. Only future messages
B. Only past messages
C. Both past and future messages
D. Nothing, unless they have the algorithm

47 What is the function of a Trapdoor Function in cryptography?

A. It deletes data automatically
B. It is easy to compute in one direction, but hard to reverse without special information (the trapdoor)
C. It allows unauthorized access to the system
D. It generates random keys

48 Which of the following describes Triple DES (3DES)?

A. Applying DES three times with up to three different keys
B. A completely new algorithm unrelated to DES
C. DES with a 3-bit key
D. Encrypting three blocks at once

49 What is HMAC?

A. Hash-based Message Authentication Code
B. High Memory Access Code
C. Hardware MAC Address
D. Hybrid Message Algorithm Cipher

50 In the context of Address Generation in Bitcoin, what is the relationship between the Public Key and the Address?

A. They are the same string
B. The Address is a hash of the Public Key
C. The Public Key is a hash of the Address
D. The Address is the Private Key