Encryption Basics
Types of Keys
History of Cryptography
Cryptography in Practice
Hashing and Signatures
100

What is the process of converting plaintext into ciphertext called?

What is encryption?

100

What kind of key is publicly available and used for encrypting messages in asymmetric encryption?

What is the public key?

100

This ancient civilization developed one of the earliest known encryption techniques called the Caesar Cipher.

What is Ancient Rome?

100

This method of securing sensitive data before storing it in a database ensures that even if the database is compromised, the data is unreadable.

What is encryption?

100

 This one-way function is used to convert data into a fixed-length hash value.

What is hashing?

200

This type of encryption uses the same key for both encryption and decryption.

What is symmetric encryption?

200

What cryptographic key is kept secret and shared between two parties in symmetric encryption?

What is the secret key?

200

The Enigma machine was used by this country during World War II to encrypt military

What is Germany?

200

This common cryptographic technique ensures that a document has not been tampered with by comparing the original and the current hash values.

What is hashing?

200

This algorithm is used to generate a hash value and is commonly used for integrity checking in files.

What is SHA-256?

300

In asymmetric encryption, what key is used to decrypt the message

What is the private key?

300

This key is derived from a user's password and is used to encrypt data, but its security depends heavily on the strength of the chosen password.

What is a Password-Based Key?

300

In the 9th century, this Arabic scholar wrote the first known book on cryptanalysis.

Who is Al-Kindi?

300

 In web browsers, this feature is indicated by a padlock icon and signifies that the communication between the client and server is encrypted.

What is HTTPS?

300

A cryptographic signature used to verify the authenticity of a message is called?

What is a digital signature?

400

This encryption method divides a message into blocks before encrypting it

What is block cipher encryption?

400

The process of generating a random and unique key for each communication session is called?

What is session key generation?

400

The deciphering of the Enigma code during World War II was largely attributed to this British mathematician.

Who is Alan Turing?

400

 This technology allows individuals to verify the identity of a website or entity using a digital certificate issued by a trusted third party.

What is Public Key Infrastructure (PKI)?

400

This type of attack occurs when two different inputs produce the same hash output.

What is a collision attack?

500

This theoretically unbreakable encryption method uses a key that is as long as the message, truly random, used only once, and kept completely secret.

What is the One-Time Pad?

500

RSA, a common encryption algorithm, relies on the difficulty of factoring what mathematical entities?

 What are large prime numbers?

500

The Navajo code talkers used their native language as a form of encryption during this major conflict.

What is World War II?

500

This process involves encrypting data at rest and in transit to ensure that it cannot be accessed by unauthorized users, even when stored or transmitted.

What is end-to-end encryption?

500

This cryptographic process involves both a hash and encryption to sign a document securely.

  •  What is HMAC (Hash-Based Message Authentication Code)?