Cryptography Questions
Classical Cryptography
- An example of a monoalphabetic cipher is:
- Shiftcipher
- Hill cipher
- Vigenere cipher
- Two conditions must hold to find the multiplicative inverse of an integer modulo another integer:
- The gcd of the integer and the modulo integer must be invertible
- The gcd of the integer and the modulo integer must be equal to one
- The gcd of the integer and the modulo integer must be equal to zero
- The main purpose of using a poly alphabetic cipher is to:
- Hide the statistical property of the plaintext letters
- Increase the number of letters in the ciphertext
- Defeat brute force attack
- Hill cipheris:
- An Asymmetric cipher
- A Symmetric cipher
- A Hash function
- Cyptography can be directly linked to all of these core security properties except:
- Confidentiality
- Integrity
- Availability
- Authenticity
Symmetric Cryptography
- The basic elements of a sound cryptography are:
- Diffusion, Key secrecy and Confusion
- Encryption, Key secrecy and confusion
- Encryption, decryption and keysecrecy
- In a blockcipher:
- Messages are encryptedat once
- Messages are split into blocks before encryption
- Messages are split into two before encryption
- Symmetric encryption can provide:
- Non-repudiation
- Confidentiality
- The following are challenges with symmetric encryption except:
- Key distribution
- Key management
- Speed of execution
- In stream ciphers:
- Successive keys are used to encrypt plaintext message
- The same key is used to encrypt plaintext message
- The security of cryptography must rely on:
- Keeping the cryptography algorithm secret
- Keeping both the crypto algorithm and the key secret
- Keeping only the key secret
Asymmetric Cryptography
- Asymmetric cryptography uses:
- Public and private keys
- A secret key known to two parties
- Public keys
- The security level of 128-bit asymmetrickey is the same as 128-bit symmetric key:
- The security of RSA is based on the difficulty of:
- Solving the logarithm problem
- Factoring large prime numbers
- Solving quadratic problem
- A 4-bit (11012) messagein an Elliptic curve can be expressed in polynomial form as:
- x^4+x^2+1
- x^3+x^2+x+1
- x^3+x^2+1
Hashing and Digital Signature
- In digital signature:
- The publickeyis used to signthemessageand theprivate keyused to verifythesignature
- The publickeyis used to encryptthemessageand theprivate keyis used to decryptit
- The private keyis used to signthemessageand thepublickeyto verify
- Hash functions should be collision resistant because:
- Authentication can only be achieved if there is no collision
- Integrity can only be preserved if there is no collision
- Confidentiality can only be achieved if there is no collision
- MAC
- Uses asymmetric keys and provide authentication and integrity
- Uses symmetric key and provide authentication and integrity
- Uses symmetric key and provide authentication, integrity and non-repudiation
- One-wayness of a hash function means
- Two different messages cannot hash to the same hash values
- One message cannot produce two different hash values
- It is not possible to derive the input from the hash output
- Which hash function has collision been found?
- What is the major difference between MAC and Hashing
- MAC provides integrity
- MAC provides authentication
- MAC provides confidentiality
- Whatis themajor differencebetweenMAC and digital signature
- MAC hashes the message and encrypt with the private key
- MAC hashes the message and the symmetric key
- MAC hashes the message
- Why do we need to hash in digital signature?
- Because we need irreversible function
- Because of speed and size
- To avoid message collisions
Public Key Infrastructure and Overview of crypto in Blockchain
- What does PKI achieve in publickey systems? (multiple answers)
- Binds an identity to a publickey
- Verifies users transactions
- Provides key management such as key distribution, validation and revocation
- How is PGP certificate different from X.509 certificatemodel? (multiple answers)
- You can create your own certificate
- You need a single authority to sign your certificate
- A PGP certificate can contain multiple signatures
- PGP uses:
- Symmetric and asymmetric crypto systems
- Only symmetric
- Only asymmetric