Demonstration and Implementation of Cryptographic Algorithms

Post Test

  1. Cryptography is the study and practice of techniques for secure communication in the presence of third parties called?
  2. a. Adversaries
    b. Security
    c. RSA
    d. XOR

  3. What is a cipher?
  4. a. Plain text
    b. Asymmetric key algorithm
    c. A secret or disguised way of writing
    d. None of the above

  5. What is the formula to decrypt the message in RSA?
  6. a. P = n^d ( mod n )
    b. P = c^d ( mod c )
    c. P = C^d ( mod d )
    d. P = C^d ( mod n )

  7. A combination of an encryption algorithm and a decryption algorithm is called a _________.
  8. a. Cipher
    b. Secret
    c. Key
    d. None of the above

  9. The acronym DES stands for?
  10. a. Digital Evaluation System
    b. Digital Encryption System
    c. Data Encryption Standard
    d. Double Encryption Standard