Asymmetric CryptoSystem Quiz! Trivia

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Shachi Natu
S
Shachi Natu
Community Contributor
Quizzes Created: 1 | Total Attempts: 2,660
Questions: 15 | Attempts: 2,660

SettingsSettingsSettings
Asymmetric Cryptosystem Quiz! Trivia - Quiz

.


Questions and Answers
  • 1. 

    In the RSA algorithm, we select 2 random large values ‘p’ and ‘q’. Which of the following is the property of ‘p’ and ‘q’?

    • A.

      P and q should be divisible by Ф(n)

    • B.

      P and q should be co-prime

    • C.

      P and q should be prime

    • D.

      P/q should give no remainder

    Correct Answer
    C. P and q should be prime
    Explanation
    The property of 'p' and 'q' in the RSA algorithm is that they should be prime. This is because the security of the RSA algorithm relies on the difficulty of factoring large composite numbers into their prime factors. By selecting 'p' and 'q' as prime numbers, it ensures that the factorization process is more challenging and helps to protect the encryption keys.

    Rate this question:

  • 2. 

    Perform encryption on the following PT using RSA and find the CT. p = 3; q = 11, e=3; M = 5

    • A.

      28

    • B.

      26

    • C.

      18

    • D.

      12

    Correct Answer
    B. 26
    Explanation
    The given question asks to perform encryption using RSA on the given plaintext (PT) and find the ciphertext (CT). The values of p and q are provided as 3 and 11 respectively, and the value of e is given as 3. The plaintext (M) is given as 5. To find the ciphertext, we need to calculate M^e mod (p*q), which is equivalent to 5^3 mod (3*11). Simplifying this expression, we get 125 mod 33, which is equal to 26. Therefore, the ciphertext (CT) is 26.

    Rate this question:

  • 3. 

    For the Knapsack: {1 6 8 15 24}, find the plain text code if the ciphertext is 38.

    • A.

      10010

    • B.

      01101

    • C.

      01001

    • D.

      01110

    Correct Answer
    B. 01101
    Explanation
    The given ciphertext is 38, and the corresponding plaintext code is 01101. This means that in the Knapsack {1 6 8 15 24}, the items with values 6, 15, and 24 were selected to form the ciphertext. By converting the binary representation of the selected items into plaintext, we get the code 01101.

    Rate this question:

  • 4. 

    Set {1, 2, 3, 9, 10, and 24} is superincreasing.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    A set is considered superincreasing if each element in the set is greater than the sum of all the previous elements. In this case, the set {1, 2, 3, 9, 10, and 24} is not superincreasing because the last element, 24, is not greater than the sum of all the previous elements (1 + 2 + 3 + 9 + 10 = 25). Therefore, the correct answer is False.

    Rate this question:

  • 5. 

    In Merkle-Hellman Cryptosystem, the hard knapsack becomes the private key and the easy knapsack becomes the public key.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    In Merkle-Hellman Cryptosystem, the easy knapsack becomes the private key and the hard knapsack becomes the public key.

    Rate this question:

  • 6. 

    Public key encryption/decryption is not preferred because:

    • A.

      It is slow

    • B.

       it is hardware/software intensive

    • C.

      It has a high computational load

    • D.

       all of the mentioned

    Correct Answer
    D.  all of the mentioned
    Explanation
    Public key encryption/decryption is not preferred because it is slow, hardware/software intensive, and has a high computational load. These factors make it less efficient and practical for certain applications.

    Rate this question:

  • 7. 

    Which of the following is not an element/field of the X.509 certificates?

    • A.

      Issuer Name

    • B.

      Serial Modifier

    • C.

       Issuer unique Identifier

    • D.

      Signature

    Correct Answer
    B. Serial Modifier
    Explanation
    The Serial Modifier is not an element/field of X.509 certificates. X.509 certificates contain fields such as Issuer Name, Issuer Unique Identifier, and Signature, which are used for identifying and verifying the certificate. However, the Serial Modifier is not a recognized field in X.509 certificates.

    Rate this question:

  • 8. 

    It is desirable to revoke a certificate before it expires because:

    • A.

       the user is no longer certified by this CA

    • B.

      The CA’s certificate is assumed to be compromised

    • C.

      The user’s private key is assumed to be compromised

    • D.

      All of the mentioned

    Correct Answer
    D. All of the mentioned
    Explanation
    It is desirable to revoke a certificate before it expires because all of the mentioned reasons are valid. Revoking a certificate ensures that the user is no longer certified by the Certificate Authority (CA), which is important if the user's certification is no longer valid or trustworthy. Additionally, revoking a certificate is necessary if the CA's certificate is assumed to be compromised or if the user's private key is assumed to be compromised. Revoking the certificate in these cases helps to maintain the security and integrity of the certificate system.

    Rate this question:

  • 9. 

     CRL stands for

    • A.

      Cipher Reusable List

    • B.

      Certificate Revocation Language

    • C.

      Certificate Revocation List

    • D.

      Certificate Resolution Language

    Correct Answer
    C. Certificate Revocation List
    Explanation
    CRL stands for Certificate Revocation List. A Certificate Revocation List is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA) before their expiration date. This list is used to check the validity of a digital certificate and ensure that it has not been revoked, ensuring the security and trustworthiness of the certificate.

    Rate this question:

  • 10. 

    The _______of user should not appear on the digital certificate.

    • A.

      Public Key

    • B.

      Private Key

    • C.

      Organization name

    • D.

      Name

    Correct Answer
    B. Private Key
    Explanation
    The private key of a user should not appear on the digital certificate because the private key is meant to be kept secret and known only to the user. It is used for encryption and decryption processes, and if it were to appear on the digital certificate, it would compromise the security of the user's data and communications. Therefore, it is important to keep the private key confidential and separate from the digital certificate.

    Rate this question:

  • 11. 

    A Registration Authority ___________ issue digital certificate.

    • A.

      Can

    • B.

      May or may not

    • C.

      Has to always

    • D.

      Can 

    Correct Answer
    D. Can 
    Explanation
    A Registration Authority can issue digital certificates. In the context of public key infrastructure (PKI), a Registration Authority (RA) is an entity responsible for verifying the identities of individuals or organizations requesting digital certificates. After performing the necessary verification steps, the RA can approve or reject the certificate request. If approved, the Certificate Authority (CA), which works closely with the RA, will issue the digital certificate. The digital certificate is a critical component in securing communications and transactions by verifying the identity of users, devices, or servers.

    Rate this question:

  • 12. 

    We trust a digital certificate because it contains __________

    • A.

      Owner's public key

    • B.

      CA's public key

    • C.

      CA's signature

    • D.

      Owner's signature

    Correct Answer
    C. CA's signature
    Explanation
    A digital certificate is trusted because it contains the CA's signature. The CA (Certificate Authority) is a trusted entity that verifies the identity of the certificate owner and signs the certificate to confirm its authenticity. By including the CA's signature, the digital certificate ensures that it has been issued by a trusted authority, providing assurance that the certificate and its associated public key can be trusted for secure communication and authentication purposes.

    Rate this question:

  • 13. 

    While creating a digital envelope, we encrypt the ___________ with the ______________

    • A.

      Sender's private key, one time session key

    • B.

      Receiver's public key, one time session key

    • C.

      One time session key sender'spublic key

    • D.

      One time session key,  receiver's public key

    Correct Answer
    D. One time session key,  receiver's public key
    Explanation
    When creating a digital envelope, the one-time session key is encrypted with the receiver's public key. This ensures that only the intended receiver, who possesses the corresponding private key, can decrypt the session key and access the encrypted message. The use of a one-time session key adds an extra layer of security as it is only used for a single communication session and then discarded, reducing the risk of key compromise and unauthorized access to the message.

    Rate this question:

  • 14. 

    To verify digital signature, we need the ________

    • A.

      Sender's private key

    • B.

      Sender's public key

    • C.

      Receiver's public key

    • D.

      Receiver's private key

    Correct Answer
    B. Sender's public key
    Explanation
    To verify a digital signature, we need the sender's public key. The sender uses their private key to create the digital signature, which is a unique cryptographic representation of the message. The receiver can then use the sender's public key to verify the digital signature and ensure that the message has not been tampered with. The public key is used for verification purposes, while the private key is kept secret by the sender to maintain the integrity and authenticity of the digital signature.

    Rate this question:

  • 15. 

    In Digital Signature, there is _____ relationship between signature and message.

    • A.

      Many to one

    • B.

      One to many

    • C.

      Many to many

    • D.

      One to one

    Correct Answer
    D. One to one
    Explanation
    In digital signature, there is a one-to-one relationship between the signature and the message. This means that a unique signature is generated for each specific message. The digital signature is created using the sender's private key and can only be decrypted using the corresponding public key. This ensures that the signature is unique to the message and verifies the authenticity and integrity of the message.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 26, 2019
    Quiz Created by
    Shachi Natu
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.