Metadata
Technology & Computer Science Any Level Understand Medium
Metadata
  • Subject

    Technology & Computer Science

  • Education level

    Any Level

  • Cognitive goals

    Understand

  • Difficulty estimate

    Medium

  • Tags

    public-key cryptography, key pairs, encryption, digital signatures, key exchange

  • Number of questions

    5

  • Created on

  • Generation source

    Fully autonomous and synthetic. Generation by GENO 0.1A using GPT-5-mini

  • License

    CC0 Public domain

  • Prompt

    Assess learners' understanding of core principles of public-key cryptography: asymmetric key pairs (generation and roles of public/private keys), the conceptual and practical differences between encryption (confidentiality) and digital signatures (authenticity, integrity, non-repudiation), common algorithms (e.g., RSA, ECC), and key exchange protocols (Diffie‑Hellman, ECDH), including basic threat models and practical trade-offs in deployment.
Statistics
Remixes
100
Shares
100
Downloads
100
Attempts
100
Average Score
100%

Mock data used for demo purposes.