Algorithms
Key Management
Protocols
Cryptanalysis
Application
100

This type of encryption uses the same key for both encryption and decryption.

What is symmetric encryption?

100

This basic component of cryptography refers to the random string of bits used to encrypt and decrypt data.

What is a cryptographic key?

100

This protocol secures web browsing by encrypting communications between web servers and browsers.

What is HTTPS (HTTP Secure) or TLS/SSL?

100

This basic form of cryptanalysis relies on analyzing the frequency of letters or symbols in encrypted text.

What is frequency analysis or "counting letters"?

100

This cryptographic technology underlies Bitcoin and other cryptocurrencies, providing a secure, decentralized transaction ledger.

What is blockchain?

200

This algorithm, created by Ron Rivest, Adi Shamir, and Leonard Adleman, is widely used for secure data transmission.

What is RSA?

200

This secure approach to key distribution involves embedding keys in hardware during manufacturing.

What is key pre-distribution?

200

This cryptographic process verifies that a message has not been altered by creating a unique identifier based on the message content.

What is a digital signature?

200

This attack occurs when two different inputs to a hash function produce the same output value.

What is a collision attack?

200

This method of storing passwords converts them into hash values with added random data to prevent rainbow table attacks.

What is password salting (or using salted hashes)?

300

This symmetric encryption algorithm became a U.S. federal government standard in 2001 and uses 128-bit, 192-bit, or 256-bit keys.

What is AES (Advanced Encryption Standard)?

300

This system manages the creation, distribution, and revocation of public key certificates and is commonly used in web security.

What is a Public Key Infrastructure (PKI)?

300

This protocol establishes a secure encrypted connection between a client and server, commonly used for remote access to systems.

What is SSH (Secure Shell)?

300

This type of attack attempts to bypass encryption by focusing on implementation flaws rather than the cryptographic algorithm itself.

What is a side-channel attack?

300

his system uses unique physical characteristics like fingerprints or retina patterns for authentication instead of encryption keys.

What is biometric authentication?

400

Unlike encryption algorithms, these one-way functions convert data into a fixed-size string of bytes, commonly used for password storage and data integrity verification.

What are hash functions (or cryptographic hash functions)?

400

This technique divides a cryptographic key into multiple parts where a minimum number of parts are needed to reconstruct the original key.

What is secret sharing, split handling, or Shamir's Secret Sharing?

400

This protocol allows two parties to establish a shared secret key over an insecure channel without any prior shared secret.

What is the Diffie-Hellman key exchange?

400

This attack attempts to recover encryption keys by analyzing the relationship between power consumption and encryption operations.

What is power analysis (or differential power analysis)?

400

This technique hides sensitive data within ordinary, non-secret data or a file, such as embedding a message within an image.

What is steganography?

500

This type of cryptographic system uses mathematical structures and provides the same security as RSA with smaller key sizes.

What is Elliptic Curve Cryptography (ECC)?

500

This method for secure key exchange uses a trusted third party to distribute symmetric keys between parties wishing to communicate securely.

What is a Key Distribution Center (KDC)?

500

This technique proves knowledge of a secret without revealing the secret itself, useful in zero-knowledge authentication systems.

What is a zero-knowledge proof?

500

This famous attack against RSA uses mathematical factorization to try to determine the prime factors of the public key.

What is integer factorization (or the factoring attack)?

500

This developing field of cryptography aims to create encryption methods that will remain secure even against quantum computers.

What is post-quantum cryptography (or quantum-resistant cryptography)?