Match brute-force, side-channel, timing, fault injection, and other crypto attacks to their scenarios.
Drag & Match ๐งฎMatch definitions, key points, uses, and NIST publications for Knapsack, DSA, ElGamal, and ECC.
Multi-Select Quiz ๐งฑDrag TCSEC levels and approximate EAL equivalents into the correct scenario rows.
Drag & Drop ๐งMatch SRAM, DRAM, secondary memory, and real memory to practical security scenarios.
Scenario Match ๐Match frequency, differential, linear, and algebraic cryptanalysis attacks to definitions.
Drag & Drop ๐งฉMatch State Machine, Noninterference, Matrix, Lattice, and Information Flow models to definitions.
Drag & Drop ๐Match characteristics to TPM (embedded, device-level) or HSM (external, enterprise-level). Key sizes, use cases, and deployment context.
Drag & Match ๐ขVestibule vs Mantrap plus the full physical security layer model: Deter, Deny, Detect, Delay, Determine, Decide.
Drag & Match ๐ฅMatch Wet Pipe, Dry Pipe, Pre-Action, and Deluge systems to their scenarios. What's in the pipes and what triggers the water?
Drag & Match ๐Drag CRL, OCSP, OCSP Stapling, HPKP, and Modern Model into chronological order. OCSP is the protocol. Stapling is the optimization.
Sequence Order โกMatch Side-Channel, Timing, Fault Injection, and Statistical attacks. Watching = side-channel. Breaking = fault injection.
Drag & Match ๐งพTest CDI, UDI, TP, IVP, and separation of duties. Well-defined transactions + separation of duties = INTEGRITY.
MCQ Quiz