UNIT3-PUBLIC KEY CRYPTOGRAPHY

UNIT3-PUBLIC KEY CRYPTOGRAPHY

University

10 Qs

quiz-placeholder

Similar activities

EDCI 3002 GP 3

EDCI 3002 GP 3

University

12 Qs

Educ 1B

Educ 1B

University

10 Qs

Examen final de adverbios

Examen final de adverbios

University

12 Qs

Words in German

Words in German

KG - University

11 Qs

Presentation skills

Presentation skills

University

10 Qs

The Đẫn's quiz

The Đẫn's quiz

University

10 Qs

Quiz-2

Quiz-2

University

12 Qs

Webinar Self.In

Webinar Self.In

University

10 Qs

UNIT3-PUBLIC KEY CRYPTOGRAPHY

UNIT3-PUBLIC KEY CRYPTOGRAPHY

Assessment

Quiz

Education

University

Medium

Created by

B.REENA CSE

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

One commonly used public-key cryptography method is the ______ algorithm.

RSA

AES

DES

Both AES & DES

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The ________ method provides a one-time session key for two parties.

Diffie Hellman

RSA

AES

DES

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Using Rivest, Shamir, Adleman cryptosystem with p=7 and q=9. Encrypt M=24 to find ciphertext. The Ciphertext is:

114

42

93

110

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Suppose that two parties A and B wish to setup a common secret key (D-H key) between themselves using the Diffie-Hellman key exchange technique. They agree on 7 as the modulus and 3 as the primitive root. Party A chooses 2 and party B chooses 5 as their respective secrets. Their D-H key is

3

4

5

6

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One characteristic/drawback of ElGamal Encryption scheme

Deterministic

Unconditional security

Cipher text is double the size of the plain text

None of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the hardness assumption behind Schnorr Digital signature scheme?

Decisional Diffie-Hellman Assumption

Computational Diffie-Hellman Assumption

Discrete logarithm

Factoring Assumption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is not the property of hash functions?

Efficient

Easy to invert

Collision resistant

Avalanche Effect

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?