0
0
Cybersecurityknowledge~10 mins

Symmetric encryption (AES, DES) in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to identify the type of encryption used.

Cybersecurity
encryption_type = "[1]"  # Common symmetric encryption algorithm
Drag options to blanks, or click blank then click option'
AMD5
BAES
CSHA256
DRSA
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing symmetric encryption with asymmetric encryption.
Mixing up encryption algorithms with hashing functions.
2fill in blank
medium

Complete the sentence to describe the key usage in symmetric encryption.

Cybersecurity
In symmetric encryption, the same [1] is used for both encryption and decryption.
Drag options to blanks, or click blank then click option'
Aalgorithm
Bsignature
Chash
Dkey
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing algorithm instead of key.
Confusing key with hash or signature.
3fill in blank
hard

Fix the error in the statement about DES encryption key size.

Cybersecurity
DES uses a [1]-bit key for encryption.
Drag options to blanks, or click blank then click option'
A56
B256
C128
D64
Attempts:
3 left
💡 Hint
Common Mistakes
Assuming DES uses 64 bits as the effective key size.
Confusing DES key size with AES key sizes.
4fill in blank
hard

Fill both blanks to complete the description of symmetric encryption modes.

Cybersecurity
AES can operate in different modes like [1] and [2], which affect how data blocks are encrypted.
Drag options to blanks, or click blank then click option'
ACBC
BRSA
CECB
DSHA
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing RSA or SHA as modes of AES.
Confusing encryption algorithms with modes.
5fill in blank
hard

Fill all three blanks to complete the dictionary comprehension describing key lengths.

Cybersecurity
key_lengths = {"AES-128": [1], "AES-192": [2], "AES-256": [3]
Drag options to blanks, or click blank then click option'
A128
B192
C256
D64
Attempts:
3 left
💡 Hint
Common Mistakes
Using 64 bits as an AES key length.
Mixing up the order of key lengths.