The Crypto Control Toolbox

In order to be awarded CPD units, you must answer the following five random questions correctly. If you fail the test, please re-read the article before attempting the questions again.

  1. In the context of digital encryption of a message, what is a private key?

  2. Which of the following techniques is NOT needed for a digital signature?

  3. What is encryption?

  4. Which is an advantage of a Zero Knowledge Proof for checking someone is who they say they are?

  5. What does PKI stand for?

  6. What does a document time-stamping service do?

  7. Which are the control objectives that the 'crypto control toolbox' techniques best support?

  8. If you had to leave a computer file of sensitive information with someone you did not trust, which of these combinations of techniques would be most suitable?

  9. Which of the following statements about good hash functions is not true?

  10. Where a Mutual Distributed Ledger is used, with 128 participants, each with one participating database, how many times is each data item recorded across the whole system?