0% found this document useful (0 votes)
14 views4 pages

6.encryption & Digital Signatures

The document provides an overview of encryption and digital signatures, detailing various types of encryption algorithms, including symmetric and asymmetric encryption. It explains key concepts such as key exchange, end-to-end encryption, and the role of digital signatures in verifying authenticity and integrity. Additionally, it covers hashing, the function of certificate authorities, and the importance of non-repudiation in digital communications.

Uploaded by

sarathivel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views4 pages

6.encryption & Digital Signatures

The document provides an overview of encryption and digital signatures, detailing various types of encryption algorithms, including symmetric and asymmetric encryption. It explains key concepts such as key exchange, end-to-end encryption, and the role of digital signatures in verifying authenticity and integrity. Additionally, it covers hashing, the function of certificate authorities, and the importance of non-repudiation in digital communications.

Uploaded by

sarathivel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CYBER SECURITY

PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315


Encryption & Digital Signatures

1. What is encryption?
a) A method to prevent phishing attacks
b) Converting plaintext into unreadable ciphertext
c) Deleting sensitive data
d) Monitoring network traffic
Answer: b
Explanation: Encryption is the process of converting readable plaintext into unreadable ciphertext to
protect data from unauthorized access.
2. Which of the following is a type of encryption algorithm?
a) Hashing
b) Symmetric and Asymmetric encryption
c) RAID
d) Firewall rules
Answer: b
Explanation: Symmetric and asymmetric encryption are two main types of encryption algorithms.
3. What is symmetric encryption?
a) Using a pair of keys for encryption and decryption
b) Using the same key for both encryption and decryption
c) Encrypting data using public keys only
d) Encrypting data without keys
Answer: b
Explanation: Symmetric encryption uses the same key for both encryption and decryption, making
it fast but less secure for sharing keys.
4. Which of the following is an example of a symmetric encryption algorithm?
a) RSA
b) AES
c) ECC
d) Diffie-Hellman
Answer: b
Explanation: AES (Advanced Encryption Standard) is a widely used symmetric encryption
algorithm.
5. What is asymmetric encryption?
a) Encryption that does not use any keys
b) Using a single shared key for all operations
c) Using a pair of public and private keys for encryption and decryption
d) A legacy encryption system
Answer: c
Explanation: Asymmetric encryption uses a pair of keys: one public and one private, providing
enhanced security for key exchange.
6. Which encryption algorithm is used for asymmetric encryption?
a) DES b) RSA c) Blowfish d) Triple DES
Answer: b
Explanation: RSA is a popular asymmetric encryption algorithm used for secure data transmission.
7. What is the purpose of a public key in encryption?
a) To encrypt and decrypt messages directly
b) To encrypt data that can only be decrypted with the matching private key
c) To hash passwords
d) To store sensitive information
Answer: b
Explanation: A public key is used to encrypt data, and only the corresponding private key can
decrypt it.

D.Sundaravel M.Sc.B.Ed(cs) -9751894315


CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
8. What is key exchange in encryption?
a) Sharing the same key with multiple users
b) Securely exchanging encryption keys between parties
c) Using a master key for all systems
d) Decrypting keys from ciphertext
Answer: b
Explanation: Key exchange is the process of securely sharing encryption keys between
communicating parties.
9. Which protocol is commonly used for secure key exchange?
a) RSA b) Diffie-Hellman c) MD5 d) SHA-256
Answer: b
Explanation: The Diffie-Hellman protocol allows secure key exchange over an untrusted network.
10. What is end-to-end encryption (E2EE)?
a) Encrypting data only during transmission
b) Ensuring data is encrypted at both sender and receiver ends
c) Encrypting data without a key
d) Storing encryption keys on a cloud server
Answer: b
Explanation: End-to-end encryption ensures data is encrypted at the sender’s end and can only be
decrypted by the receiver.

Digital Signatures
11. What is a digital signature?
a) A scanned image of a handwritten signature
b) A cryptographic mechanism to verify authenticity and integrity
c) An encrypted message
d) A method for encrypting files
Answer: b
Explanation: A digital signature is a cryptographic mechanism used to verify the authenticity and
integrity of digital data.
12. Which cryptographic method is used to create a digital signature?
a) Symmetric encryption b) Asymmetric encryption
c) Hashing only d) RAID
Answer: b
Explanation: Digital signatures rely on asymmetric encryption, where a private key is used to sign
data, and a public key is used for verification.
13. What is the main purpose of a digital signature?
a) To encrypt messages
b) To verify the sender’s identity and data integrity
c) To compress files
d) To exchange keys securely
Answer: b
Explanation: Digital signatures verify the authenticity of the sender and ensure that the data has not
been altered.
14. What is a hash function in the context of digital signatures?
a) Encrypting a message
b) Converting data into a fixed-size digest
c) Decrypting data using a private key
d) Exchanging encryption keys
Answer: b
Explanation: A hash function converts input data into a fixed-size digest, which is then used in the
digital signature process.

D.Sundaravel M.Sc.B.Ed(cs) -9751894315


CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
15. What is the role of a certificate authority (CA) in digital signatures?
a) Encrypting user data b) Issuing and verifying digital certificates
c) Storing private keys securely d) Compressing digital files
Answer: b
Explanation: A certificate authority issues digital certificates, which validate the ownership of
public keys.
16. What is a digital certificate?
a) A document signed with a public key
b) A record issued by a CA to verify a public key's ownership
c) A tool for encrypting messages
d) A software for compressing data
Answer: b
Explanation: A digital certificate is issued by a CA to prove the ownership of a public key.
17. What is the purpose of a private key in digital signatures?
a) Encrypting the digital certificate b) Creating the digital signature
c) Verifying the digital signature d) Exchanging encryption keys
Answer: b
Explanation: A private key is used to create a digital signature, ensuring it is unique to the sender.
18. What is non-repudiation in digital signatures?
a) Ensuring data encryption during transit
b) Ensuring a sender cannot deny sending a signed message
c) Ensuring files are compressed
d) Preventing unauthorized access to keys
Answer: b
Explanation: Non-repudiation ensures that the sender of a digitally signed message cannot deny
having sent it.
19. What is a PKI (Public Key Infrastructure)?
a) A framework for managing encryption keys and digital certificates
b) A database for storing user credentials
c) A symmetric encryption algorithm
d) A protocol for secure file transfer
Answer: a
Explanation: PKI is a framework for managing public and private keys and issuing digital
certificates.
20. What is the purpose of hashing in digital signatures?
a) Encrypting the message for confidentiality
b) Generating a unique fixed-size representation of data
c) Storing user credentials
d) Exchanging encryption keys securely
Answer: b
Explanation: Hashing ensures a unique digest of the data, which is signed to ensure data integrity
and authenticity.

Mixed Concepts
21. What is the difference between encryption and hashing?
a) Encryption is reversible; hashing is not
b) Hashing is reversible; encryption is not
c) Both encryption and hashing are reversible
d) Neither encryption nor hashing is reversible
Answer: a
Explanation: Encryption can be reversed using keys, while hashing is a one-way process and cannot
be reversed.

D.Sundaravel M.Sc.B.Ed(cs) -9751894315


CYBER SECURITY
PGTRB Computer Science - Latest Study Materials-2025 – D. Sundaravel M.Sc.B.Ed(CS) -9751894315
22. What is an example of a hashing algorithm?
a) AES b) SHA-256 c) RSA d) Diffie-Hellman
Answer: b
Explanation: SHA-256 is a widely used hashing algorithm to generate fixed-size digests of data.
23. What does integrity mean in digital communication?
a) Data has been encrypted b) Data remains unaltered during transmission
c) Data is accessible only to authorized users d) Data is compressed for faster transfer
Answer: b
Explanation: Integrity ensures that the data has not been tampered with or altered during
transmission.
24. Which algorithm is widely used for digital signatures?
a) RSA b) DES c) AES d) MD5
Answer: a
Explanation: RSA is a popular algorithm used for creating digital signatures.
25. What is the size of a SHA-256 hash output?
a) 128 bits b) 256 bits c) 512 bits d) 1024 bits
Answer: b
Explanation: SHA-256 produces a fixed hash output size of 256 bits.

26. What is the primary advantage of elliptic curve cryptography (ECC)?


a) It uses a symmetric key for encryption
b) It provides strong security with shorter key lengths
c) It eliminates the need for a private key
d) It is faster than hashing algorithms
Answer: b
Explanation: ECC provides high levels of security using smaller key sizes compared to traditional
methods like RSA, making it efficient and secure.
27. Which of the following ensures data confidentiality in encryption?
a) Hashing b) Symmetric and asymmetric encryption
c) Digital signatures d) Public key certificates
Answer: b
Explanation: Encryption (both symmetric and asymmetric) ensures that data remains confidential
by converting plaintext into unreadable ciphertext.
28. What is the role of a timestamp in digital signatures?
a) Encrypting the signature b) Indicating when the signature was created
c) Generating the hash value d) Storing the private key
Answer: b
Explanation: A timestamp in a digital signature confirms the time the signature was created,
ensuring the signature's validity within a given time frame.
29. What is a common application of digital signatures in real-world scenarios?
a) Password management b) Email signing and verification
c) File compression d) Database management
Answer: b
Explanation: Digital signatures are commonly used for signing and verifying emails to ensure the
authenticity and integrity of the message.
30. How do digital signatures provide integrity?
a) By encrypting the entire message
b) By verifying the hash of the message with the sender's public key
c) By using symmetric encryption algorithms
d) By storing the message in a secure database
Answer: b
Explanation: Digital signatures verify the integrity of the message by comparing the hash value
generated during signing with the hash value of the received message.

D.Sundaravel M.Sc.B.Ed(cs) -9751894315

You might also like