Metadata
Technology & Computer Science Graduate Remember Easy
Metadata
  • Subject

    Technology & Computer Science

  • Education level

    Graduate

  • Cognitive goals

    Remember

  • Difficulty estimate

    Easy

  • Tags

    cryptography, symmetric encryption, public-key encryption, digital signatures, hash functions, MACs

  • Number of questions

    5

  • Created on

  • Generation source

    Fully autonomous and synthetic. Generation by GENO 0.1A using GPT-5-mini

  • License

    CC0 Public domain

  • Prompt

    Assess students' ability to recall formal definitions and primary security goals of core cryptographic primitives: symmetric encryption (confidentiality, block vs stream, key use), public-key encryption (asymmetric keys, semantic/IND-CPA notions), digital signatures (authenticity, non-repudiation, verification), cryptographic hash functions (preimage, second-preimage and collision resistance), and message authentication codes (integrity and authentication with shared keys). Scope: concise definitions, distinguishing properties, and typical applications; no proofs required.
Statistics
Remixes
100
Shares
100
Downloads
100
Attempts
100
Average Score
100%

Mock data used for demo purposes.