UNIT3-PUBLIC KEY CRYPTOGRAPHY

UNIT3-PUBLIC KEY CRYPTOGRAPHY

University

10 Qs

quiz-placeholder

Similar activities

Technical Analysis

Technical Analysis

9th Grade - Professional Development

10 Qs

Part 1 CCNA

Part 1 CCNA

University

15 Qs

Capacity & Process Design

Capacity & Process Design

University

12 Qs

Learning Objects (Albert D. Ritzhaupt)

Learning Objects (Albert D. Ritzhaupt)

University

11 Qs

DBMS-Basic concepts

DBMS-Basic concepts

University

10 Qs

Speaking of Speech Explaining Visuals

Speaking of Speech Explaining Visuals

University

14 Qs

E231 KAK1043 (Week 1-9 Revision)

E231 KAK1043 (Week 1-9 Revision)

University

10 Qs

LabSeguridad-G1

LabSeguridad-G1

University

11 Qs

UNIT3-PUBLIC KEY CRYPTOGRAPHY

UNIT3-PUBLIC KEY CRYPTOGRAPHY

Assessment

Quiz

Education

University

Hard

Created by

B.REENA CSE

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

One commonly used public-key cryptography method is the ______ algorithm.

RSA

AES

DES

Both AES & DES

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The ________ method provides a one-time session key for two parties.

Diffie Hellman

RSA

AES

DES

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:

114

42

93

110

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Suppose that two parties A and B wish to setup a common secret key (D-H key) between themselves using the Diffie-Hellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their D-H key is

3

4

5

6

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One characteristic/drawback of ElGamal Encryption scheme

Deterministic

Unconditional security

Cipher text is double the size of the plain text

None of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the hardness assumption behind Schnorr Digital signature scheme?

Decisional Diffie-Hellman Assumption

Computational Diffie-Hellman Assumption

Discrete logarithm

Factoring Assumption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is not the property of hash functions?

Efficient

Easy to invert

Collision resistant

Avalanche Effect

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?