Cryptography and Encryption Techniques # MCQs Practice set

Q.1 Which of the following is the main purpose of cryptography?

Data storage
Data confidentiality
Data deletion
Data compression
Explanation - Cryptography ensures that sensitive data remains confidential by encrypting it so only authorized parties can read it.
Correct answer is: Data confidentiality

Q.2 What does 'encryption' mean in cryptography?

Converting data into human language
Deleting data permanently
Transforming readable data into unreadable form
Compressing data to save space
Explanation - Encryption changes plaintext into ciphertext so that unauthorized users cannot understand it.
Correct answer is: Transforming readable data into unreadable form

Q.3 Which of the following is a symmetric encryption algorithm?

RSA
AES
ECC
Diffie-Hellman
Explanation - AES is a symmetric encryption algorithm where the same key is used for both encryption and decryption.
Correct answer is: AES

Q.4 In asymmetric encryption, how many keys are used?

1
2
3
4
Explanation - Asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption.
Correct answer is: 2

Q.5 What is plaintext?

Encrypted text
Readable text before encryption
Key used in encryption
Digital signature
Explanation - Plaintext refers to original, human-readable data before encryption is applied.
Correct answer is: Readable text before encryption

Q.6 Which algorithm is widely used in public-key cryptography?

AES
RSA
DES
SHA-256
Explanation - RSA is a commonly used public-key (asymmetric) encryption algorithm.
Correct answer is: RSA

Q.7 What is ciphertext?

Text compressed for storage
Text encrypted and unreadable
Readable text before encryption
Key used in decryption
Explanation - Ciphertext is the result of encryption, where plaintext is transformed into unreadable text.
Correct answer is: Text encrypted and unreadable

Q.8 Which cryptographic technique ensures that data has not been altered?

Encryption
Decryption
Hashing
Compression
Explanation - Hashing creates a fixed-length value from data to verify its integrity, ensuring it hasn't been changed.
Correct answer is: Hashing

Q.9 What is the full form of AES?

Advanced Encryption Standard
Automatic Encoding System
Applied Encryption Standard
Advanced Encoding System
Explanation - AES stands for Advanced Encryption Standard, a popular symmetric encryption algorithm.
Correct answer is: Advanced Encryption Standard

Q.10 Which encryption algorithm uses a 56-bit key?

AES
RSA
DES
ECC
Explanation - DES (Data Encryption Standard) uses a 56-bit key, but it is now considered insecure.
Correct answer is: DES

Q.11 What does a digital signature provide?

Confidentiality
Integrity and authentication
Compression
Data deletion
Explanation - Digital signatures verify that data came from the claimed sender and has not been altered.
Correct answer is: Integrity and authentication

Q.12 Which key is kept secret in asymmetric encryption?

Public key
Private key
Session key
Hash key
Explanation - The private key is kept secret and is used for decryption or signing messages.
Correct answer is: Private key

Q.13 What is the process of converting ciphertext back into plaintext called?

Encryption
Hashing
Decryption
Encoding
Explanation - Decryption is the reverse process of encryption, turning ciphertext back into readable plaintext.
Correct answer is: Decryption

Q.14 Which of the following is NOT an encryption algorithm?

AES
RSA
SHA-256
DES
Explanation - SHA-256 is a hashing algorithm, not an encryption algorithm.
Correct answer is: SHA-256

Q.15 In symmetric cryptography, the sender and receiver must:

Use different keys
Share the same key
Use public keys only
Avoid using any key
Explanation - Symmetric cryptography requires both parties to use the same secret key for encryption and decryption.
Correct answer is: Share the same key

Q.16 Which of these is a block cipher?

AES
RSA
SHA-256
ECC
Explanation - AES is a block cipher that encrypts data in fixed-size blocks.
Correct answer is: AES

Q.17 Which cryptographic method is based on mathematical problems like factoring large numbers?

AES
RSA
DES
SHA-1
Explanation - RSA’s security relies on the difficulty of factoring large prime numbers.
Correct answer is: RSA

Q.18 Which of the following is true about hashing?

It can be reversed
It is one-way
It requires keys
It compresses files
Explanation - Hashing is a one-way process; it cannot be reversed to obtain the original data.
Correct answer is: It is one-way

Q.19 What is the size of the output of SHA-256 hashing?

128 bits
256 bits
512 bits
64 bits
Explanation - SHA-256 always produces a fixed 256-bit output regardless of input size.
Correct answer is: 256 bits

Q.20 Which of these is a stream cipher?

AES
DES
RC4
RSA
Explanation - RC4 is a widely known stream cipher, operating on data one bit/byte at a time.
Correct answer is: RC4

Q.21 Elliptic Curve Cryptography (ECC) is considered secure because:

It uses very long keys
It relies on the difficulty of the elliptic curve discrete logarithm problem
It is symmetric
It compresses data
Explanation - ECC’s strength comes from the difficulty of solving elliptic curve discrete logarithm problems.
Correct answer is: It relies on the difficulty of the elliptic curve discrete logarithm problem

Q.22 Which is faster for large data: symmetric or asymmetric encryption?

Symmetric
Asymmetric
Both are equal
Depends on the algorithm
Explanation - Symmetric encryption is much faster than asymmetric encryption for large volumes of data.
Correct answer is: Symmetric

Q.23 Which protocol uses both symmetric and asymmetric encryption?

HTTP
SSL/TLS
FTP
SMTP
Explanation - SSL/TLS uses asymmetric encryption to exchange keys and symmetric encryption for data transmission.
Correct answer is: SSL/TLS

Q.24 What does 'key exchange' mean in cryptography?

Sharing plaintext
Sharing encryption keys securely
Sharing hash values
Deleting old keys
Explanation - Key exchange is the process of securely transmitting encryption keys between communicating parties.
Correct answer is: Sharing encryption keys securely

Q.25 Which of the following is a one-time pad considered to be?

Perfectly secure
Insecure
Block cipher
Stream cipher
Explanation - A one-time pad is theoretically unbreakable when used correctly with random keys.
Correct answer is: Perfectly secure