Here, we have a set of multiple-choice questions and answers (quiz) on Quantum Cryptography.
Title | |
---|---|
Which possible Attacks in Quantum Cryptography can take place?Which possible Attacks in Quantum Cryptography can take place?
The answer is:
D. Possible Attacks in Quantum Cryptography and Faked-State Attack
|
|
_____ and ______ protocol models can be extended to Entangled particles theory_____ and ______ protocol models can be extended to Entangled particles theory.
The answer is:
C. SARG04 and SSP
|
|
Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?
The answer is:
B. Foreseen Solution
|
|
Which two principles of quantum mechanics on which quantum cryptography are dependent?Which two principles of quantum mechanics on which quantum cryptography are dependent?
The answer is:
A. Heisenberg Uncertainty Principle and Photon Polarization Principle
|
|
How many elements are used in cryptography tools? |
|
Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____.
The answer is:
B. Cryptographic tasks
|
|
The greatest threat is to public cryptography or asymmetric algorithms used for ____The greatest threat is to public cryptography or asymmetric algorithms used for ____.
The answer is:
C. Both A and B
|
|
Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,
The answer is:
D. All of the mentioned above
|
|
A quantum state is a superposition of classical states, |
|
Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.
The answer is:
D. None of the mentioned above
|
MCQs
Views
Best Answers
Points