Here, we have a set of multiplechoice questions and answers (quiz) on Quantum Cryptography.
Title  

Which possible Attacks in Quantum Cryptography can take place?Which possible Attacks in Quantum Cryptography can take place?
The answer is:
D. Possible Attacks in Quantum Cryptography and FakedState Attack


_____ and ______ protocol models can be extended to Entangled particles theory_____ and ______ protocol models can be extended to Entangled particles theory.
The answer is:
C. SARG04 and SSP


Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?
The answer is:
B. Foreseen Solution


Which two principles of quantum mechanics on which quantum cryptography are dependent?Which two principles of quantum mechanics on which quantum cryptography are dependent?
The answer is:
A. Heisenberg Uncertainty Principle and Photon Polarization Principle


How many elements are used in cryptography tools? 

Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____.
The answer is:
B. Cryptographic tasks


The greatest threat is to public cryptography or asymmetric algorithms used for ____The greatest threat is to public cryptography or asymmetric algorithms used for ____.
The answer is:
C. Both A and B


Amongst which of the following is/ are true with reference to stepbystep breakdown of the process of quantum cryptography,Amongst which of the following is/ are true with reference to stepbystep breakdown of the process of quantum cryptography,
The answer is:
D. All of the mentioned above


A quantum state is a superposition of classical states, 

PostQuantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____PostQuantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.
The answer is:
D. None of the mentioned above

MCQs
Views
Best Answers
Points