Group | Hint | Answer | % Correct |
---|---|---|---|
SHA | A | Algorithm | 93%
|
SHA | H | Hash | 93%
|
SHA | S | Secure | 89%
|
CBC | C | Cipher | 78%
|
HKDF | K | Key | 78%
|
PKI | K | Key | 78%
|
AES | A | Advanced | 74%
|
OAEP | E | Encryption | 74%
|
AEAD | E | Encryption | 74%
|
AES | E | Encryption | 74%
|
AES | S | Standard | 70%
|
CBC | B | Block | 59%
|
PKI | P | Public | 56%
|
MAC | C | Code | 52%
|
ECDH | E | Elliptic | 48%
|
ECDH | C | Curve | 44%
|
RSA | R | Rivest | 44%
|
ECDH | H | Hellman | 41%
|
ECDH | D | Diffie | 37%
|
PKI | I | Infrastructure | 37%
|
MAC | M | Message | 33%
|
RSA | S | Shamir | 33%
|
OAEP | A | Asymmetric | 30%
|
MAC | A | Authentication | 30%
|
CBC | C | Chaining | 30%
|
GCM | C | Counter | 30%
|
GCM | M | Mode | 30%
|
OAEP | P | Padding | 30%
|
AEAD | D | Data | 26%
|
RSA | A | Adleman | 22%
|
HKDF | F | Function | 22%
|
GCM | G | Galois | 22%
|
OAEP | O | Optimal | 22%
|
AEAD | A | Associated | 19%
|
AEAD | A | Authenticated | 19%
|
HKDF | D | Derivation | 19%
|
PFS | F | Forward | 15%
|
PFS | P | Perfect | 15%
|
PFS | S | Secrecy | 11%
|
HKDF | H | HMAC-based | 7%
|
Copyright H Brothers Inc, 2008–2024
Contact Us | Go To Top | View Mobile Site