Evolution
Set 1: Cryptography Fundamentals and Evolution
1. What is the significance of the term 'kryptos' in the field of cryptography?
o It refers to the process of encoding information
o It signifies the concept of secrecy or concealment (Answer)
o It denotes a specific encryption algorithm
o It is the name of a historical cipher
2. Which of the following best categorizes the two primary types of cryptographic
algorithms?
o Symmetric and asymmetric (Answer)
o Public and private
o Hashing and encryption
o Block and stream
3. What is the field that encompasses both the creation of secure communication
methods and the analysis of those methods for vulnerabilities?
o Cryptography
o Cryptanalysis
o Cryptology (Answer)
o Steganography
4. In the realm of cryptography, what defines a 'dual-use good'?
o A technology exclusively used for civilian purposes
o A technology that can be utilized for both military and civilian applications (Answer)
o A technology that is only applicable in academic research
o A technology that is restricted to government use
5. What is the primary objective of the Wassenaar Arrangement in relation to dual-
use technologies?
o To promote unrestricted access to all cryptographic technologies globally
o To establish guidelines for the export of dual-use goods and technologies, including
cryptography (Answer)
o To eliminate all forms of encryption in international trade
o To create a unified global standard for encryption algorithms
6. Describe the benefit of confidentiality in cryptography:
o Idea that the communication is with the intended person
o Keeping things secret (Answer)
o Knowing that a message was not changed
, o Denies ability of someone to say "it wasn't me"
7. When discussing protections provided by cryptography, what does non-repudiation
mean?
o Individuals are prevented from fraudulently denying that they were involved in a
transaction. (Answer)
o It means the encrypted information cannot be changed except by authorized users who
have the key.
o Encrypted information can only be viewed by those who have been provided the key.
o It means there is proof that the sender was legitimate and not an imposter.
8. Hashing is used to ensure message integrity by ____________
o Comparing hash values (Answer)
o Encrypting data
o Encapsulating data
o Comparing algorithms and keys
9. Which of the following statements regarding digital signatures is FALSE?
o The purpose of a digital signature is to authenticate or guarantee that the individual
sending the message really is who he claims to be.
o A digital signature uniquely identifies the sender by including a picture file of the
sender's written signature. (Answer)
o To be effective, digital signatures must be "unforgeable."
o Digital signatures are used to authenticate the individual sending the message so as to
ensure the integrity of the data.
10. Which of the following represents the fundamental operations used in
cryptographic techniques?
o Substitution and transposition (Answer)
o Encryption and decryption
o Encoding and decoding
o Hashing and salting
Set 2: Cryptographic Attacks and Analysis
1. What role did the known plaintext attack play in the context of World War II
cryptography?
o It was used to enhance the security of the Enigma machine.
o It allowed cryptanalysts to exploit weaknesses in the Enigma machine. (Answer)
o It was primarily focused on symmetric key algorithms.
o It provided a method for generating random keys.
2. Which of the following best describes a chosen plaintext attack in cryptography?
o A method where the attacker can choose arbitrary plaintexts to be encrypted and
analyze the resulting ciphertexts. (Answer)