HomeTriviaTech & GamesRSA cryptography
concept🎮 Tech & Games

RSA cryptography Trivia Questions

How much do you really know about RSA cryptography? Below are 8 true or false statements. Click each one to reveal the answer and explanation.

1.

RSA can be used for both encryption and digital signatures with the same key pair.

Click to reveal answer ›

Easy
✓ TRUE

RSA supports both functions: encrypt with public key, decrypt with private; sign with private, verify with public. This dual use is a key feature.

2.

RSA's security relies on the fact that factoring large semiprimes is computationally hard for classical computers.

Click to reveal answer ›

Medium
✓ TRUE

Yes, the security of RSA is directly based on the difficulty of factoring the product of two large primes—a problem that remains hard with classical algorithms.

3.

RSA encryption is faster than AES encryption for large messages when using the same key size.

Click to reveal answer ›

Medium
✗ FALSE

False. RSA is thousands of times slower than AES for bulk data. In practice, RSA is only used to encrypt symmetric keys.

4.

If an attacker steals your RSA private key, they can decrypt past messages encrypted with your public key—but not future ones.

Click to reveal answer ›

Medium
✗ FALSE

False. With the private key, they can decrypt any message encrypted with the corresponding public key, past or future, unless perfect forward secrecy is used.

5.

RSA is vulnerable to a chosen-ciphertext attack if padding like OAEP is not used.

Click to reveal answer ›

Hard
✓ TRUE

True. Without proper padding (e.g., OAEP), RSA is malleable and can be broken via chosen-ciphertext attacks, as shown by Bleichenbacher.

6.

RSA keys are generated by picking two random primes and multiplying them; the public exponent must always be a prime number.

Click to reveal answer ›

Hard
✗ FALSE

The public exponent (commonly 65537) does not have to be prime—it just needs to be coprime with phi(n). 65537 is chosen for efficiency, not primality necessity.

7.

The RSA algorithm was publicly invented in 1977 by Rivest, Shamir, and Adleman—but a British intelligence agency had secretly discovered it earlier.

Click to reveal answer ›

Hard
✓ TRUE

True. In 1973, Clifford Cocks at GCHQ invented an equivalent scheme, but it was classified until 1997.

8.

A 2048-bit RSA key is considered secure today partly because quantum computers cannot break it any faster than classical ones.

Click to reveal answer ›

Hard
✓ TRUE

Actually, quantum computers using Shor's algorithm can break RSA of any size in polynomial time. This statement is false because quantum attacks are far faster.

More in Tech & Games

MinecraftTrivia Questions →ChessTrivia Questions →TetrisTrivia Questions →Super MarioTrivia Questions →The Legend of ZeldaTrivia Questions →
View all Tech & Games topics →

Want to test yourself in real time?

Swipe right for True, left for False. New questions every day on PopBluff.

Play PopBluff Free →