# Cryptography MCQs with Answer

What does SSL stand for?

A) Secure Socket Layer

B) Secure System Layer

C) Secure Software Layer

D) Secure Server Layer

Answer: A) Secure Socket Layer

Which encryption algorithm is commonly used for securing wireless networks?

A) AES

B) RSA

C) DES

D) WEP

Answer: D) WEP

What is the main purpose of using a cryptographic hash function?

A) Encryption

B) Authentication

C) Integrity

D) Compression

Answer: C) Integrity

Which key is used for encryption and decryption in symmetric-key cryptography?

A) Public key

B) Private key

C) Session key

D) Shared key

Answer: D) Shared key

Which cryptographic algorithm is widely used for digital signatures?

A) RSA

B) AES

C) DES

D) Diffie-Hellman

Answer: A) RSA

Which of the following is NOT a symmetric encryption algorithm?

A) AES

B) RSA

C) DES

D) 3DES

Answer: B) RSA

What is the process of converting plaintext into ciphertext called?

A) Decryption

B) Encoding

C) Hashing

D) Encryption

Answer: D) Encryption

Which encryption algorithm is known for its strength and efficiency and is widely used in various cryptographic applications?

A) RSA

B) AES

C) DES

D) Blowfish

Answer: B) AES

What is the primary purpose of a digital signature?

A) Authentication

B) Confidentiality

C) Integrity

D) Non-repudiation

Answer: D) Non-repudiation

Which type of encryption uses the same key for both encryption and decryption?

A) Symmetric-key encryption

B) Asymmetric-key encryption

C) Public-key encryption

D) Private-key encryption

Answer: A) Symmetric-key encryption

Which of the following is NOT a symmetric encryption algorithm?

A) RSA

B) AES

C) DES

D) Blowfish

Answer: A) RSA

What is the primary purpose of a digital certificate?

A) Encryption

B) Authentication

C) Compression

D) Decryption

Answer: B) Authentication

Which cryptographic algorithm is vulnerable to brute force attacks due to its small key size?

A) AES

B) RSA

C) DES

D) Diffie-Hellman

Answer: C) DES

What is the process of converting ciphertext into plaintext called?

A) Decryption

B) Encoding

C) Hashing

D) Encryption

Answer: A) Decryption

Which of the following is NOT a property of a secure cryptographic hash function?

A) Preimage resistance

B) Second preimage resistance

C) Collision resistance

D) Deterministic output

Answer: D) Deterministic output

Which encryption algorithm is commonly used for securing email communication?

A) RSA

B) AES

C) DES

D) PGP

Answer: D) PGP

Which cryptographic algorithm is used for generating symmetric keys securely over insecure communication channels?

A) RSA

B) AES

C) Diffie-Hellman

D) DES

Answer: C) Diffie-Hellman

Which of the following is NOT a component of public-key cryptography?

A) Public key

B) Private key

C) Shared key

D) Digital signature

Answer: C) Shared key

What is the primary purpose of a cryptographic nonce?

A) Authentication

B) Integrity

C) Non-repudiation

D) Randomness

Answer: D) Randomness

Which of the following is a block cipher encryption algorithm?

A) RSA

B) Diffie-Hellman

C) AES

D) ECC

Answer: C) AES

Which cryptographic algorithm is used for securing data transmission over the internet?

A) RSA

B) AES

C) SSL/TLS

D) Diffie-Hellman

Answer: C) SSL/TLS

Which encryption algorithm is based on the Diffie-Hellman key exchange protocol?

A) RSA

B) AES

C) ECC

D) ElGamal

Answer: D) ElGamal

Which of the following is NOT a security requirement in cryptography?

A) Confidentiality

B) Integrity

C) Scalability

D) Authentication

Answer: C) Scalability

What is the primary purpose of a cryptographic salt?

A) Authentication

B) Non-repudiation

C) Randomness

D) Integrity

Answer: C) Randomness

Which cryptographic algorithm is used for creating digital signatures in the DSA scheme?

A) RSA

B) AES

C) DES

D) SHA

Answer: D) SHA

Which of the following is NOT a symmetric encryption algorithm?

A) RSA

B) AES

C) DES

D) Blowfish

Answer: A) RSA

What is the primary purpose of a cryptographic nonce?

A) Authentication

B) Integrity

C) Non-repudiation

D) Randomness

Answer: D) Randomness

Which encryption algorithm is commonly used for securing email communication?

A) RSA

B) AES

C) DES

D) PGP

Answer: D) PGP

What is the primary purpose of a cryptographic salt?

A) Authentication

B) Non-repudiation

C) Randomness

D) Integrity

Answer: C) Randomness

Which of the following is a block cipher encryption algorithm?

A) RSA

B) Diffie-Hellman

C) AES

D) ECC

Answer: C) AES

Which cryptographic algorithm is used for securing data transmission over the internet?

A) RSA

B) AES

C) SSL/TLS

D) Diffie-Hellman

Answer: C) SSL/TLS

What is the primary purpose of a digital signature?

A) Authentication

B) Confidentiality

C) Integrity

D) Non-repudiation

Answer: D) Non-repudiation

Which encryption algorithm is based on the Diffie-Hellman key exchange protocol?

A) RSA

B) AES

C) ECC

D) ElGamal

Answer: D) ElGamal

What is the main purpose of using a cryptographic hash function?

A) Encryption

B) Authentication

C) Integrity

D) Compression

Answer: C) Integrity

Which key is used for encryption and decryption in symmetric-key cryptography?

A) Public key

B) Private key

C) Session key

D) Shared key

Answer: D) Shared key

What is the purpose of a digital certificate?

A) Encryption

B) Authentication

C) Compression

D) Decryption

Answer: B) Authentication

Which encryption algorithm is vulnerable to brute force attacks due to its small key size?

A) AES

B) RSA

C) DES

D) Diffie-Hellman

Answer: C) DES

What is the primary goal of a cryptographic nonce?

A) Authentication

B) Integrity

C) Non-repudiation

D) Randomness

Answer: D) Randomness

Which cryptographic algorithm is used for creating digital signatures in the DSA scheme?

A) RSA

B) AES

C) DES

D) SHA

Answer: D) SHA

Which of the following is NOT a symmetric encryption algorithm?

A) RSA

B) AES

C) DES

D) Blowfish

Answer: A) RSA

What is the primary purpose of a digital signature?

A) Authentication

B) Confidentiality

C) Integrity

D) Non-repudiation

Answer: D) Non-repudiation

Which cryptographic algorithm is used for securing wireless networks?

A) AES

B) RSA

C) DES

D) WEP

Answer: D) WEP

What is the primary purpose of using a cryptographic hash function?

A) Encryption

B) Authentication

C) Integrity

D) Compression

Answer: C) Integrity

Which encryption algorithm is commonly used for securing wireless networks?

A) AES

B) RSA

C) DES

D) WEP

Answer: D) WEP

Which encryption algorithm is known for its strength and efficiency and is widely used in various cryptographic applications?

A) RSA

B) AES

C) DES

D) Blowfish

Answer: B) AES

What does the term “SSL” stand for?

A) Secure Socket Layer

B) Secure System Layer

C) Secure Software Layer

D) Secure Server Layer

Answer: A) Secure Socket Layer

Which encryption algorithm is widely used for digital signatures?

A) RSA

B) AES

C) DES

D) Diffie-Hellman

Answer: A) RSA

Which of the following is NOT a component of public-key cryptography?

A) Public key

B) Private key

C) Shared key

D) Digital signature

Answer: C) Shared key

Which cryptographic algorithm is used for generating symmetric keys securely over insecure communication channels?

A) RSA

B) AES

C) Diffie-Hellman

D) DES

Answer: C) Diffie-Hellman

What is the purpose of a digital certificate?

A) Encryption

B) Authentication

C) Compression

D) Decryption

Answer: B) Authentication