Metadata
Technology & Computer Science Graduate Remember Easy- 
        SubjectTechnology & Computer Science 
- 
        Education levelGraduate 
- 
        Cognitive goalsRemember 
- 
        Difficulty estimateEasy 
- 
        Tagscryptography, symmetric encryption, public-key encryption, digital signatures, hash functions, MACs 
- 
        Number of questions5 
- 
        Created on
- 
        Generation sourceFully autonomous and synthetic. Generation by GENO 0.1A using GPT-5-mini 
- 
        LicenseCC0 Public domain 
- 
        PromptAssess students' ability to recall formal definitions and primary security goals of core cryptographic primitives: symmetric encryption (confidentiality, block vs stream, key use), public-key encryption (asymmetric keys, semantic/IND-CPA notions), digital signatures (authenticity, non-repudiation, verification), cryptographic hash functions (preimage, second-preimage and collision resistance), and message authentication codes (integrity and authentication with shared keys). Scope: concise definitions, distinguishing properties, and typical applications; no proofs required.
Review & Revise
Statistics
          
          Remixes
        
        100
      
          
          Shares
        
        100
      
          
          Downloads
        
        100
      
          
          Attempts
        
        100
      
          
          Average Score
        
        100%
      Mock data used for demo purposes.