Search Header Logo

SP2 - Crypto protocols 1 (3-pass, Secret Shar., Bit Com.)

Authored by Cristina Solà

Mathematics

University

Used 2+ times

SP2 - Crypto protocols 1 (3-pass, Secret Shar., Bit Com.)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shamir's three-pass protocol allows...

A user to commit to a chosen value that is kept secret until it is latter revealed.

Two parties to exchange encrypted messages without first sharing cryptographic keys.

To share secrets between a subset of users such that information is not leaked from individual shares.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is Shamir's 3-pass protocol always secure (regardless of the encryption scheme used)?

Yes

No

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why shouldn't the Verman cipher be used in Shamir's 3-pass protocol?

In Verman cipher, E(k2, E(k1, m))

!=

E(k1, E(k2, m)).

Verman cipher is insecure.

Using Verman within Shamir's 3-pass protocol is not secure.

It can be used without problems.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Shamir secret sharing scheme allows...

A user to commit to a chosen value that is kept secret until it is latter revealed.

Two parties to exchange encrypted messages without first sharing cryptographic keys.

To share secrets between a subset of users such that information is not leaked from individual shares.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

I want to share my bank password (1234) with my 4 best friends, so that the four of them together can access my funds. Each of my friends is getting a digit of the secret (Alice gets 1, Bob gets 2, Carol gets 3, and David gets 4). Why is this not a good scheme for sharing my password?

It is a great scheme.

They won't be able to recover my password, even if all of them collaborate.

Information is leaked to individual users.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

I have made 4 paper copies of my bank password, and stored them in 4 different locations. In this way, if I forget the password, I would be able to recover it. Why is this not a good scheme?

It is a great scheme.

Each of the copies is susceptible to leakage.

It is not useful for recovering the password.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many points do we need to recover a 4-degree polynomial?

3

4

5

6

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?