Here, we have a set of multiple-choice questions and answers (quiz) on Quantum Cryptography.

questions

Title
Which possible Attacks in Quantum Cryptography can take place?

Which possible Attacks in Quantum Cryptography can take place?


  1. Possible Attacks in Quantum Cryptography and Birthday Attack
  2. Birthday attack and Boomerang attack
  3. Brute force attack and Faked-State-Attack
  4. Possible Attacks in Quantum Cryptography and Faked-State Attack
discuss
_____ and ______ protocol models can be extended to Entangled particles theory

_____ and ______ protocol models can be extended to Entangled particles theory.


  1. SARG04 and HTTP
  2. FTP and SSP
  3. SARG04 and SSP
  4. HTTP and FTP
discuss
Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?

Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?


  1. Quantum Solution
  2. Foreseen Solution
  3. Cryptographic Solution
  4. Block Cipher Solution
discuss
Which two principles of quantum mechanics on which quantum cryptography are dependent?

Which two principles of quantum mechanics on which quantum cryptography are dependent?


  1. Heisenberg Uncertainty Principle and Photon Polarization Principle
  2. Fundamental Principle and Bohr's Model Principle
  3. Momentum Principle and Photons Principle
  4. Planck's Principle and Fundamental Principle
discuss
How many elements are used in cryptography tools?

How many elements are used in cryptography tools?


  1. 1
  2. 4
  3. 6
  4. 3
discuss
Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____

Quantum cryptography is the science of exploiting quantum mechanical properties to perform _____.


  1. Cryptographic system
  2. Cryptographic tasks
  3. Decryption system
  4. None of the mentioned above
discuss
The greatest threat is to public cryptography or asymmetric algorithms used for ____

The greatest threat is to public cryptography or asymmetric algorithms used for ____.


  1. Digital signatures
  2. Key exchange
  3. Both A and B
  4. None of the mentioned above
discuss
Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,

Amongst which of the following is/ are true with reference to step-by-step breakdown of the process of quantum cryptography,


  1. The sender sends a photon through a polarizer with randomly assigned polarizations and bit assignment
  2. Photon uses a beam splitter that can be horizontal, vertical, or diagonal to decode or read the polarization of each photon
  3. Receiver tells the sender the random assignments of a beam splitter for each photon in the same sequence it was sent
  4. All of the mentioned above
discuss
A quantum state is a superposition of classical states,

A quantum state is a superposition of classical states,


  1. True
  2. False
discuss
Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____

Post-Quantum Cryptography is a classical cryptographic scheme that is conjectured to be secure against ____.


  1. Quantum adversaries
  2. Quantum integration
  3. Quantum hash
  4. None of the mentioned above
discuss
total MCQs: 10

MCQs

10

Views

34

Best Answers

299

Points

5