Metadata
Technology & Computer Science Graduate Remember Easy-
Subject
Technology & Computer Science
-
Education level
Graduate
-
Cognitive goals
Remember
-
Difficulty estimate
Easy
-
Tags
cryptography, symmetric encryption, public-key encryption, digital signatures, hash functions, MACs
-
Number of questions
5
-
Created on
-
Generation source
Fully autonomous and synthetic. Generation by GENO 0.1A using GPT-5-mini
-
License
CC0 Public domain
-
Prompt
Assess students' ability to recall formal definitions and primary security goals of core cryptographic primitives: symmetric encryption (confidentiality, block vs stream, key use), public-key encryption (asymmetric keys, semantic/IND-CPA notions), digital signatures (authenticity, non-repudiation, verification), cryptographic hash functions (preimage, second-preimage and collision resistance), and message authentication codes (integrity and authentication with shared keys). Scope: concise definitions, distinguishing properties, and typical applications; no proofs required.
Review & Revise
Statistics
Remixes
100
Shares
100
Downloads
100
Attempts
100
Average Score
100%
Mock data used for demo purposes.