1. What does RSA stand for?
A) Rivest, Shamir, Adleman
B) Randomized Secure Algorithm
C) Real Secure Algorithm
D) Reliable Security Algorithm
ANSWER: A
2. Which problem is RSA based on?
A) Factoring large prime numbers
B) Discrete logarithm problem
C) Factoring the product of two large prime numbers
D) Symmetric key distribution
ANSWER: C
3. In RSA, the public key consists of:
A) Two prime numbers
B) One prime number and one composite number
C) One composite number and one exponent
D) Two composite numbers
ANSWER: C
4. Which of the following is a common use of RSA?
A) Data encryption
B) Digital signatures
C) Key exchange
D) All of the above
ANSWER: D
5. In RSA, what is the modulus n ?
A) The sum of two prime numbers
B) The product of two prime numbers
C) The difference of two prime numbers
D) The product of a prime number and a composite number
ANSWER: B
6. What is the private key in RSA composed of?
A) n and e
B) p and q
C) n and d
D) d and e
ANSWER: C
7. The security of RSA relies on the difficulty of:
A) Multiplying large numbers
B) Finding discrete logarithms
C) Factoring large composite numbers
D) Solving linear equations
ANSWER: C
8. In RSA, which operation is used to encrypt a message?
A) Exponentiation
B) Multiplication
C) Division
D) Addition
ANSWER: A
9. What is the typical key size for RSA to be considered secure?
A) 128 bits
B) 256 bits
C) 1024 bits
D) 2048 bits or higher
ANSWER: D
10. What does the exponent e in RSA represent?
A) Encryption exponent
B) Decryption exponent
C) Modulus
D) Prime number
ANSWER: A
11. In RSA, the encryption process transforms plaintext M into ciphertext C
using which formula?
A) C = M^d \mod n
B) C = M^e \mod n
C) C = (M + e) \mod n
D) C = M \times e \mod n
ANSWER: B
12. In RSA, which value is kept secret?
A) n
B) e
C) p and q
D) All of the above
ANSWER: C
13. What is the purpose of the decryption exponent d in RSA?
A) To encrypt the message
B) To decrypt the message
C) To generate the public key
D) To factor the modulus
ANSWER: B
14. Which of the following is NOT true about RSA?
A) RSA can be used for digital signatures.
B) RSA relies on the hardness of the factoring problem.
C) RSA keys are shorter than ECC keys for the same security level.
D) RSA encryption involves modular exponentiation.
ANSWER: C
15. In the context of RSA, what does the totient function \phi(n) represent?
A) The number of prime factors of n
B) The number of integers less than n that are relatively prime to n
C) The product of the prime factors of n
D) The modulus used in encryption and decryption
ANSWER: B
16. Why is it important to choose large prime numbers in RSA?
A) To make the encryption faster
B) To ensure the modulus n is large and difficult to factor
C) To make the decryption process easier
D) To reduce the size of the keys
ANSWER: B
17. What is a common attack against poorly implemented RSA?
A) Brute force attack
B) Key exchange attack
C) Side channel attack
D) Meet in the middle attack
ANSWER: C
18. Which of the following is essential for RSA key generation?
A) A random number generator
B) A hash function
C) A pseudorandom number generator
D) A block cipher
ANSWER: C
19. In RSA, what happens if e and \phi(n) are not coprime?
A) Encryption will fail
B) Decryption will fail
C) Key generation will fail
D) Both encryption and decryption will fail
ANSWER: D
20. Which of the following standards recommend the use of RSA?
A) AES
B) IEEE 802.11
C) PKCS #1
D) SHA 2
ANSWER: C
21. What does ECC stand for?
A) Elliptical Curve Cryptography
B) Elliptic Curve Cryptography
C) Elliptical Cryptographic Curve
D) Efficient Curve Cryptography
ANSWER: B
22. ECC is based on the difficulty of solving which problem?
A) Factoring large integers
B) Discrete logarithm problem
C) Elliptic curve discrete logarithm problem
D) Matrix inversion problem
ANSWER: C
23. Which field is commonly used in ECC?
A) Real numbers
B) Complex numbers
C) Finite fields
D) Rational numbers
ANSWER: C
24. What is the main advantage of ECC over RSA?
A) Shorter key sizes for the same security level
B) Simpler algorithm
C) Faster key generation
D) Larger keys for more security
ANSWER: A
25. In ECC, a point on the elliptic curve is defined by:
A) A single coordinate
B) Two coordinates (x, y)
C) Three coordinates (x, y, z)
D) Four coordinates (x, y, z, w)
ANSWER: B
26. What is the equation of an elliptic curve in ECC over a finite field?
A) y^2 = x^3 + ax + b
B) y^2 + xy = x^3 + ax + b
C) y = mx + c
D) x^2 + y^2 = r^2
ANSWER: A
27. In ECC, what is the 'base point'?
A) The point at infinity
B) A specific point used to generate the public key
C) The point where the curve intersects the y axis
D) The point with the smallest x coordinate
ANSWER: B
28. Which operation is used in ECC for cryptographic purposes?
A) Point addition
B) Point subtraction
C) Point doubling
D) Both A and C
ANSWER: D
29. In ECC, the private key is:
A) A point on the elliptic curve
B) A randomly chosen integer
C) The sum of two coordinates
D) A large prime number
ANSWER: B
30. The public key in ECC is obtained by:
A) Multiplying the private key with the base point
B) Adding the private key to the base point
C) Dividing the private key by the base point
D) Subtracting the base point from the private key
ANSWER: A
31. ECC key sizes are typically:
A) Larger than RSA key sizes
B) Smaller than RSA key sizes
C) The same size as RSA key sizes
D) Not comparable to RSA key sizes
ANSWER: B
32. Which of the following is a well known elliptic curve used in ECC?
A) Curve25519
B) SHA 256
C) AES 256
D) RSA 2048
ANSWER: A
33. What is the order of a point in ECC?
A) The number of points on the curve
B) The number of times the point must be added to itself to get the point at
infinity
C) The x coordinate of the point
D) The y coordinate of the point
ANSWER: B
34. In ECC, what is the 'point at infinity'?
A) A point with infinitely large coordinates
B) A point used as the identity element in elliptic curve operations
C) The point where the curve intersects the x axis
D) A point that does not lie on the curve
ANSWER: B
35. Which property of elliptic curves is exploited in ECC?
A) Symmetry
B) Difficulty of solving discrete logarithm problems
C) Easy multiplication and difficult division
D) All of the above
ANSWER: D
36. What does ECDSA stand for?
A) Elliptic Curve Data Security Algorithm
B) Elliptic Curve Digital Signature Algorithm
C) Elliptic Curve Discrete Signature Algorithm
D) Efficient Curve Digital Signature Algorithm
ANSWER: B
37. Which of the following is NOT true about ECC?
A) ECC can be used for encryption.
B) ECC keys are longer than RSA keys for the same security level.
C) ECC is based on the algebraic structure of elliptic curves over finite
fields.
D) ECC is widely used in mobile devices for secure communication.
ANSWER: B
38. Why is ECC considered suitable for mobile devices?
A) It uses less computational power
B) It requires less bandwidth
C) It provides strong security with shorter keys
D) All of the above
ANSWER: D
39. Which algorithm is used to perform key exchange in ECC?
A) ECDH
B) ECDSA
C) AES
D) RSA
ANSWER: A
40. What is a common application of ECC in modern technology?
A) Email encryption
B) Digital certificates
C) Secure web browsing (HTTPS)
D) All of the above
ANSWER: D
41. In ECC, what does the scalar multiplication of a point involve?
A) Adding the point to itself a certain number of times
B) Multiplying the coordinates of the point
C) Subtracting the point from itself
D) Dividing the coordinates of the point
ANSWER: A
42. Which of the following is a standard that includes ECC?
A) FIPS 186 4
B) PKCS #1
C) IEEE 802.3
D) SHA 1
ANSWER: A
43. What is the security assumption behind ECC?
A) Large prime factorization
B) Integer factorization
C) Discrete logarithm problem
D) Elliptic curve discrete logarithm problem
ANSWER: D
44. Which of the following is NOT an elliptic curve operation?
A) Point addition
B) Point multiplication
C) Point division
D) Point doubling
ANSWER: C
45. In ECC, the difficulty of solving the elliptic curve discrete logarithm
problem is based on:
A) The size of the finite field
B) The choice of the base point
C) The size of the prime number used
D) The structure of the elliptic curve
ANSWER: D
46. Which of the following protocols can use ECC for secure communication?
A) TLS/SSL
B) IPsec
C) SSH
D) All of the above
ANSWER: D
47. What is the primary mathematical operation used in ECDSA?
A) Point multiplication
B) Point addition
C) Hashing
D) Symmetric encryption
ANSWER: A
48. What is the typical key size of ECC to provide equivalent security to a 2048
bit RSA key?
A) 160 bits
B) 224 bits
C) 256 bits
D) 512 bits
ANSWER: C
49. Which curve is commonly used in ECC for high security applications?
A) NIST P 192
B) Curve25519
C) SECP256k1
D) NIST P 521
ANSWER: D
50. In ECC, which of the following is used to verify a digital signature?
A) The private key
B) The base point
C) The public key
D) The hash function
ANSWER: C