CYS 401 · Chapter 6

Knowledge Quiz

Asymmetric Cryptography, RSA, Hash Functions, Digital Signatures & PKI — 25 questions across 5 categories

0
Correct
0
Wrong
0/25
Answered
0 / 25 answered
Section A
Multiple Choice

Select the best answer for each question.

Q1Multiple Choice
What is RSA named after?
ARandom Secure Algorithm
BRivest, Shamir, and Adleman
CRobust Symmetric Architecture
DRoot Security Authority
Q2Multiple Choice
In RSA, which component is shared between both the public key and the private key?
AThe private exponent d
BThe public exponent e
CThe modulus n
DThe Euler totient φ(n)
Q3Multiple Choice
To encrypt a message for Bob using RSA, Alice should use:
AAlice's private key
BBob's private key
CBob's public key
DAlice's public key
Q4Multiple Choice
To create a digital signature, the sender uses:
AReceiver's public key
BSender's public key
CReceiver's private key
DSender's private key
Q5Multiple Choice
Why would a Certification Authority (CA) revoke a digital certificate?
AThe user's public key has been compromised
BThe user moved to a new location
CThe user's private key has been compromised
DThe certificate's hash algorithm is outdated
Q6Multiple Choice
Which best describes a Certification Authority (CA)?
AAn organization that issues private keys and corresponding algorithms
BAn organization that validates encryption processes
CAn organization that verifies encryption keys
DAn organization that issues certificates
Q7Multiple Choice
The security of RSA is based on the computational difficulty of:
ASolving discrete logarithms
BFactoring large numbers into their prime components
CReversing SHA-256 hashes
DBreaking symmetric encryption keys
Q8Multiple Choice
Which of the following provides non-repudiation?
AHash function alone
BMessage Authentication Code (MAC)
CDigital Signature
DSymmetric encryption
Q9Multiple Choice
In the first step of RSA key generation, what are p and q?
ARandom integers greater than 1000
BTwo distinct prime numbers
CThe public and private exponents
DHash values of the message
Q10Multiple Choice
In PKI, which component stores certificates and Certificate Revocation Lists (CRLs) in a publicly accessible database?
ACertification Authority (CA)
BRegistration Authority (RA)
CRepository
DDigital Certificate
Section B
True or False

Decide whether each statement is TRUE or FALSE.

Q11True / False
Asymmetric key cryptography uses the same key for both encryption and decryption.
✅ True
❌ False
Q12True / False
A digital signature provides non-repudiation, meaning the sender cannot deny having signed the message.
✅ True
❌ False
Q13True / False
SHA-1 is currently the recommended hashing algorithm for security-critical applications because it produces a 512-bit digest.
✅ True
❌ False
Q14True / False
The modulus n appears in both the RSA public key and the RSA private key.
✅ True
❌ False
Q15True / False
A Message Authentication Code (MAC) provides non-repudiation because it proves exactly who sent the message.
✅ True
❌ False
Section C
Short Answer

Type your answer. Smart keyword detection will grade your response — no need to be word-perfect, but include the key concepts.

Q16Short Answer
What is the main idea behind asymmetric-key cryptography? What mathematical concept does it rely on?
Q17Short Answer
What is a Digital Certificate? Who creates it, and what problem does it solve?
Q18Short Answer
What is a Certificate Revocation List (CRL) and how are revoked certificates identified within it?
Q19Short Answer
Explain the difference between a hash function and a MAC (Message Authentication Code). What extra security does MAC provide?
Q20Short Answer
Describe the role of the Registration Authority (RA) in a PKI system. How does it differ from the Certification Authority (CA)?
Section D
RSA Calculation

Work through RSA calculations step by step. Enter numerical answers.

Q21Calculation
Given p = 3 and q = 11, calculate n and φ(n).
p = 3, q = 11 n = p × q = ? φ(n) = (p−1)(q−1) = ?
Q22Calculation
Using the RSA setup where p=3, q=11, e=7, d=3, n=33: encrypt the message M=2.
Encryption formula: C = M^e mod n C = 2^7 mod 33 = ?
Q23Calculation
Using the same RSA setup (d=3, n=33), decrypt the ciphertext C=29.
Decryption formula: M = C^d mod n M = 29^3 mod 33 = ?
Section E
Concept Application

Apply your knowledge to real-world scenarios.

Q24Short Answer
Alice wants to send Bob a message that is both encrypted (confidential) AND digitally signed. Describe step by step which keys she uses and in what order.
Q25Short Answer
Bob receives a digitally signed document from Alice. Explain how Bob verifies the signature and what it proves if the verification succeeds.
🏆
Quiz Complete!