Science & Technology·Prelims Questions

Cryptography — Prelims Questions

Constitution VerifiedUPSC Verified
Version 1Updated 10 Mar 2026
Q1medium

Which of the following statements about symmetric-key cryptography is/are correct? 1. It uses a single, shared secret key for both encryption and decryption. 2. AES (Advanced Encryption Standard) is a prominent example of a symmetric-key algorithm. 3. Key distribution is generally simpler compared to asymmetric-key cryptography. Select the correct answer using the code given below:

Q2easy

Consider the following statements regarding cryptographic hash functions: 1. They are designed to be reversible, allowing the original data to be recovered from the hash value. 2. SHA-256 is a commonly used cryptographic hash function. 3. They are primarily used to ensure data confidentiality. Which of the statements given above is/are correct?

Q3medium

With reference to Public Key Infrastructure (PKI) in India, consider the following statements: 1. PKI relies on Certificate Authorities (CAs) to issue and manage digital certificates. 2. The IT Act, 2000, provides legal recognition to digital signatures issued under PKI. 3. PKI is primarily used for symmetric-key exchange. Which of the statements given above is/are correct?

Q4hard

Which of the following cryptographic concepts is most directly threatened by the development of large-scale quantum computers?

Q5medium

Which of the following statements best describes the primary function of Elliptic Curve Cryptography (ECC) compared to RSA?

Q6medium

In the context of India's digital security, consider the following: 1. IT Act, 2000 2. RBI Cybersecurity Framework 3. CERT-In Advisories 4. Digital Personal Data Protection Act, 2023 Which of the above are relevant for establishing and enforcing cryptographic standards and practices in India?

Q7hard

What is the primary purpose of 'padding' in cryptographic algorithms like RSA?

Q8medium

Consider the following statements about 'end-to-end encryption': 1. It ensures that only the communicating users can read the messages. 2. Intermediary service providers cannot access the content of the communication. 3. It is universally mandated by law for all digital communication in India. Which of the statements given above is/are correct?

Q9easy

Which of the following is NOT a core property of a strong cryptographic hash function?

Q10medium

Regarding the use of cryptography in blockchain technology, which of the following statements is/are correct? 1. Cryptographic hash functions link blocks together, ensuring immutability. 2. Digital signatures are used to authenticate transactions and prove ownership. 3. Symmetric-key encryption is primarily used for securing individual transactions within a block. Select the correct answer using the code given below:

Q11easy

Which of the following bodies/acts in India is/are responsible for issuing guidelines or providing legal framework related to cybersecurity and cryptographic practices? 1. Reserve Bank of India (RBI) 2. Indian Computer Emergency Response Team (CERT-In) 3. Ministry of Electronics & Information Technology (MeitY) 4. Digital Personal Data Protection Act, 2023 Select the correct answer using the code given below:

Featured
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.
Ad Space
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.