Asymmetric Cryptosystem Quiz! Trivia

15 Questions | Total Attempts: 1997

SettingsSettingsSettings
Asymmetric Cryptosystem Quiz! Trivia - Quiz

.


Questions and Answers
  • 1. 
    In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?
    • A. 

      P and q should be divisible by ะค(n)

    • B. 

      P and q should be co-prime

    • C. 

      P and q should be prime

    • D. 

      P/q should give no remainder

  • 2. 
    Perform encryption on the following PT using RSA and find the CT. p = 3; q = 11, e=3; M = 5
    • A. 

      28

    • B. 

      26

    • C. 

      18

    • D. 

      12

  • 3. 
    For the Knapsack: {1 6 8 15 24}, find the plain text code if the ciphertext is 38.
    • A. 

      10010

    • B. 

      01101

    • C. 

      01001

    • D. 

      01110

  • 4. 
    Set {1, 2, 3, 9, 10, and 24} is superincreasing.
    • A. 

      True

    • B. 

      False

  • 5. 
    In Merkle-Hellman Cryptosystem, the hard knapsack becomes the private key and the easy knapsack becomes the public key.
    • A. 

      True

    • B. 

      False

  • 6. 
    Public key encryption/decryption is not preferred because:
    • A. 

      It is slow

    • B. 

       it is hardware/software intensive

    • C. 

      It has a high computational load

    • D. 

       all of the mentioned

  • 7. 
    Which of the following is not an element/field of the X.509 certificates?
    • A. 

      Issuer Name

    • B. 

      Serial Modifier

    • C. 

       Issuer unique Identifier

    • D. 

      Signature

  • 8. 
    It is desirable to revoke a certificate before it expires because:
    • A. 

       the user is no longer certified by this CA

    • B. 

      The CA’s certificate is assumed to be compromised

    • C. 

      The user’s private key is assumed to be compromised

    • D. 

      All of the mentioned

  • 9. 
     CRL stands for?
    • A. 

      Cipher Reusable List

    • B. 

      Certificate Revocation Language

    • C. 

      Certificate Revocation List

    • D. 

      Certificate Resolution Language

  • 10. 
    The _______of user should not appear on the digital certificate.
    • A. 

      Public Key

    • B. 

      Private Key

    • C. 

      Organization name

    • D. 

      Name

  • 11. 
    A Registration Authority ___________ issue digital certificate.
    • A. 

      Can

    • B. 

      May or may not

    • C. 

      Has to always

    • D. 

      Can never

  • 12. 
    We trust a digital certificate because it contains __________
    • A. 

      Owner's public key

    • B. 

      CA's public key

    • C. 

      CA's signature

    • D. 

      Owner's signature

  • 13. 
    While creating a digital envelope, we encrypt the ___________ with the ______________
    • A. 

      Sender's private key, one time session key

    • B. 

      Receiver's public key, one time session key

    • C. 

      One time session key sender'spublic key

    • D. 

      One time session key,  receiver's public key

  • 14. 
    To verify digital signature, we need the ________
    • A. 

      Sender's private key

    • B. 

      Sender's public key

    • C. 

      Receiver's public key

    • D. 

      Receiver's private key

  • 15. 
    In Digital Signature, there is _____ relationship between signature and message.
    • A. 

      Many to one

    • B. 

      One to many

    • C. 

      Many to many

    • D. 

      One to one

Back to Top Back to top