Home
Current Affairs January 2024

What is the correct answer?

4

Which possible Attacks in Quantum Cryptography can take place?

A. Possible Attacks in Quantum Cryptography and Birthday Attack

B. Birthday attack and Boomerang attack

C. Brute force attack and Faked-State-Attack

D. Possible Attacks in Quantum Cryptography and Faked-State Attack

Correct Answer :

D. Possible Attacks in Quantum Cryptography and Faked-State Attack


Photon Number Splitting (PNS) Attack:
As we know that it is not possible to send a single photon thus a pulse is sent. So, some of the photons from a pulse can be captured by Eve and after matching bits by Amit and Bobby, Eve can use the same polarizer as done by Bobby and thus get the key without being detected in cryptography.
Faked-State Attack: Mainly, Eve uses a replica of Bob’s photon detector and thus captures the photons intended for Bobby and further passed it to Bobby. Thus, Eve knows about the encoded bit, Bobby thinks that he received it from Amit.

Related Questions

What is the correct answer?

4

A key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext. Which of the following is capable of becoming a key in a cryptographic algorithm?

A. An integer values

B. A square matrix

C. An array of characters (i.e. a string)

D. All of the above

What is the correct answer?

4

Which of the following is not a type of symmetric-key cryptography technique?

A. Caesar cipher

B. Data Encryption Standard (DES)

C. Diffie Hellman cipher

D. Playfair cipher

What is the correct answer?

4

What is the full-form of RSA in the RSA encryption technique?

A. Round Security Algorithm

B. Rivest, Shamir, Adleman

C. Robert, Shamir, Addie

D. None of the above

What is the correct answer?

4

____ is the message or data that can be readable by the sender.

A. Edited

B. Main Text

C. Plain text

D. All of the mentioned above

What is the correct answer?

4

Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____.

A. Cryptographic system

B. Cryptographic tasks

C. Decryption system

D. None of the mentioned above

What is the correct answer?

4

Which of the following options is not correct according to the definition of the Hash Function?

A. Hash Functions are mathematical functions

B. They compress the input values

C. The hash functions work on arbitrary length input but produces fixed length output.

D. None of the above

What is the correct answer?

4

Which of the following is /are offered by the Hash functions?

A. Authentication

B. Non repudiation

C. Data Integrity

D. All of the above

What is the correct answer?

4

Which possible Attacks in Quantum Cryptography can take place?

A. Possible Attacks in Quantum Cryptography and Birthday Attack

B. Birthday attack and Boomerang attack

C. Brute force attack and Faked-State-Attack

D. Possible Attacks in Quantum Cryptography and Faked-State Attack

What is the correct answer?

4

Security Goals of Cryptography are

A. Confidentiality

B. Authenticityn

C. Data integrityn

D. All of these

What is the correct answer?

4

To encrypt the plaintext, a cryptographic algorithm works in combination with a key...

A. Word, number, or phrase

B. Special Symbols

C. Function Keys

D. All of these

What is the correct answer?

4

Which of the following security attacks is not an active attack? ORWhich of the following attacks is a passive attack?

A. Masquerade

B. Modification of message

C. Denial of service

D. Traffic analysis

What is the correct answer?

4

Which of the following security services cannot be achieved using the Hash functions?ORWhich of the following is not possible through hash value?

A. Password Check

B. Data Integrity check

C. Digital Signatures

D. Data retrieval in its original form

What is the correct answer?

4

The above steps are performed in each round of which of the following ciphers?

A. Rail fence cipher

B. Data Encryption Standard (DES)

C. Advance Encryption Standard (AES)

D. None of the above

What is the correct answer?

4

The private key in asymmetric key cryptography is kept by

A. Sender

B. Receiver

C. Sender and receiver

D. All the connected devices to the network

What is the correct answer?

4

Which of the following modes of operations can be followed for both stream ciphers as well as block ciphers?

A. CBC (Cipher Block Chaining)

B. ECB (Electronic Code Book)

C. CFB (Cipher text Feed Back)

D. All of the above

What is the correct answer?

4

Hash functions are mathematical functions that transform or map a given set of data into a bit string of fixed size, also known as the hash value.

A. Hash value

B. Map value

C. Both A and B

D. None of the mentioned above

What is the correct answer?

4

A cryptographic hash function is an equation used to verify the ____ of data.

A. Variety

B. Validity

C. Veracity

D. None of the mentioned above

What is the correct answer?

4

Amongst which of the following is /are good for Hashes,

A. Password protection

B. Data integrity / file verification

C. Digital signatures and virus signatures

D. All of the mentioned above

What is the correct answer?

4

Conventional cryptography also known as ... encryption.

A. asymmetric-key

B. logical-key

C. symmetric-key

D. None of these

What is the correct answer?

4

Data encryption standard is a block cipher and encrypts data in blocks of size of _____ each.

A. 16 bits

B. 64 bits

C. 32 bits

D. All of the mentioned above

What is the correct answer?

4

_____ and encryption is two separate cryptographic processes.

A. Hashing

B. Decryption

C. Processing

D. None of the mentioned above

What is the correct answer?

4

An initialization vector (IV) or starting variable (SV) is a block of bits that is used by several modes to _____.

A. Randomize the decryption

B. Randomize the encryption

C. Minimize and maximize the randomization

D. None of the mentioned above

What is the correct answer?

4

Which of the following is not a principle of data security?

A. Data Confidentiality

B. Data Integrity

C. Authentication

D. None of the above

What is the correct answer?

4

RSA algorithm is ____ cryptography algorithm.

A. Systematic

B. Symmetric

C. Asymmetric

D. None of the mentioned above

What is the correct answer?

4

Hash functions are used in ___ and have variable levels of complexity and difficulty.

A. System approach

B. Cyber safe

C. Cryptography

D. None of the mentioned above

What is the correct answer?

4

The number of rounds in the AES algorithm depends upon the key size being used.Which among the following shows a correct relation between the size of the key used and the number of rounds performed in the AES algorithm?

A. 128 key size: 10 rounds

B. 192 key size: 12 rounds

C. 256 key size: 14 rounds

D. All of the above

What is the correct answer?

4

Which of the following options is not correct according to the definition of the Cipher Block Chaining (CBC)?

A. CBC is a mode of operation for stream ciphers.

B. Initialization vector (IV) is used in CBC in the initial phase.

C. It has better resistive nature towards cryptanalysis than ECB

D. None of the above

What is the correct answer?

4

Cipher in cryptography is

A. Encrypted message

B. Algorithm for performing encryption and decryption

C. Both algorithm for performing encryption and decryption and encrypted message

D. Decrypted message

What is the correct answer?

4

Digital Signatures authenticates the sender by appending the original message with the ____ digest.

A. Decrypted message

B. Encrypted message

C. Systematic approach

D. None of the mentioned above

What is the correct answer?

4

Which of the following ciphers is a block cipher?

A. Caesar cipher

B. Vernam cipher

C. Playfair cipher

D. None of the above