Metadata
Technology & Computer Science Any Level Understand Medium-
Subject
Technology & Computer Science
-
Education level
Any Level
-
Cognitive goals
Understand
-
Difficulty estimate
Medium
-
Tags
public-key cryptography, key pairs, encryption, digital signatures, key exchange
-
Number of questions
5
-
Created on
-
Generation source
Fully autonomous and synthetic. Generation by GENO 0.1A using GPT-5-mini
-
License
CC0 Public domain
-
Prompt
Assess learners' understanding of core principles of public-key cryptography: asymmetric key pairs (generation and roles of public/private keys), the conceptual and practical differences between encryption (confidentiality) and digital signatures (authenticity, integrity, non-repudiation), common algorithms (e.g., RSA, ECC), and key exchange protocols (Diffie‑Hellman, ECDH), including basic threat models and practical trade-offs in deployment.
Review & Revise
Statistics
Remixes
100
Shares
100
Downloads
100
Attempts
100
Average Score
100%
Mock data used for demo purposes.