[go: up one dir, main page]

0% found this document useful (0 votes)
48 views3 pages

AB IBCC Quiz 1

Uploaded by

srinivasareddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views3 pages

AB IBCC Quiz 1

Uploaded by

srinivasareddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

INTRODUCTION TO BLOCKCHAIN & CRYPTO CURRENCIES

20CS3045RB

ALM- QUIZ 1

16*1=16

Answer all questions

1. RSA was invented when?


I. 1979
II. 1977
III. 1978
IV. 1980

2. What will be the value of ɸ(n) when p=61 and q=53?


I. 3250
II. 3120
III. 3210
IV. 3220

3. Euclid’s algorithm is used to get what?

I. Random number
II. GCD of two numbers
III. LCM of two numbers
IV. Prime numbers

4. Diffie and Hellman has digital signature, the statement is –

I. True
II. False

5. With Chinese Remainder Theorem (CRT) RSA’s decryption is faster theoretically –


I. 8 times
II. 12 times
III. 16 times
IV. 4 times

6. A Digital Signature Scheme has what?

I. a signing algorithm
II. a verification algorithm
III. a signing algorithm and a verification algorithm
IV. None of these
7. To counter Chosen-Ciphertext Attack (CCA) on RSA it is recommended to modify the
plaintext using
I. a signing algorithm
II. a procedure known as optimal asymmetric encryption padding (OAEP).
III. a verification algorithm
IV. a signing algorithm and a verification algorithm
V. None of these

8. In Hybrid Encryption (Real World) what can be used-

I. Symmetric encryption (e.g. DES) and Symmetric key


encrypted asymmetrically (e.g., RSA)
II. Asymmetric encryption and asymmetric key encrypted asymmetrically
III. Symmetric encryption and Symmetric key encrypted symmetrically
IV. None of these

9. In Hybrid Decryption (Real World) what can be used-


I. Symmetric decryption and Symmetric key decrypted symmetrically
II. Asymmetric decryption and asymmetric key decrypted asymmetrically
III. Symmetric decryption (e.g. DES) Asymmetric decryption of “session” key (e.g. RSA)
IV. None of these

10. Equivalent ECC key size is 160 bits as compared to –


I. 1024 bit size of RSA
II. 2048 bit size of RSA
III. 4096 bit size of RSA
IV. None of these

11. Equivalent ECC key size is 512 bits as compared to –


I. 2048 bit size of RSA
II. 3072 bit size of RSA
III. 7680 bit size of RSA
IV. 15360 bit size of RSA

12. Mainstream cryptocurrencies use 100% ECDSA-


I. False
II. True

13. Bitcoin has smart contract-


I. True
II. False

14. Bankchain is based on–


I. Public Blockchain
II. Private Blockchain
III. Consortium or Federated Blockchain
15. EWF (Energy Web Foundation) based on -

I. Public Blockchain
II. Private Blockchain
III. Consortium or Federated Blockchain

16. Bitcoin and Litecoin are based on -

I. Public Blockchain
II. Private Blockchain
III. Consortium or Federated Blockchain

You might also like