Expert Algorithm Quiz

Assess your grasp of intricate cryptographic primitives and their security guarantees.

encryptionpublic keyalgorithm analysissymmetrylattice cryptopost-quantumelliptic curveshashing
Difficulty:HARD

Quiz Details

Questions7
CategoryCryptography & Codes
DifficultyHARD
Start Quiz
Progress
0/0
0%

Quiz Questions

Answer all questions below and test your knowledge.

  1. 1

    Which step of the AES-256 key schedule introduces the round constant (Rcon) into the expanded key?

    Question 1
  2. 2

    What primary security benefit does RSA-OAEP provide over plain RSA encryption?

    Question 2
  3. 3

    In a cryptographic hash function, which property ensures that finding two distinct inputs with the same output is computationally infeasible?

    Question 3
  4. 4

    During ECDSA signature verification, which value is compared to the x-coordinate of the curve point derived from the public key and the signature components?

    Question 4
  5. 5

    What is the theoretical upper bound on the work factor for a preimage attack against SHA-256, assuming an ideal hash function?

    Question 5
  6. 6

    In NTRU encryption, which lattice property is essential for the decryption correctness?

    Question 6
  7. 7

    Which statement best describes the current security status of Supersingular Isogeny Diffie-Hellman (SIDH) against quantum adversaries?

    Question 7

Never miss a quiz!

Daily challenges on Telegram

Join Now