Home » Cryptography » Cryptography MCQs

# MCQ | Quantum Cryptography

Here, we have a **set of multiple-choice questions and answers (quiz) on Quantum Cryptography**.

Submitted by Monika Sharma, on March 23, 2020

**1) Which possible Attacks in Quantum Cryptography can take place?**

- Possible Attacks in Quantum Cryptography and Birthday Attack
- Birthday attack and Boomerang attack
- Brute force attack and Faked-State-Attack
- Possible Attacks in Quantum Cryptography and Faked-State Attack

**Answer:** d. Possible Attacks in Quantum Cryptography and Faked-State Attack

**Explanation:**

**Photon Number Splitting (PNS) Attack:**

As we know that it is not possible to send a single photon thus a pulse is sent. So, some of the photons from a pulse can be captured by Eve and after matching bits by Amit and Bobby, Eve can use the same polarizer as done by Bobby and thus get the key without being detected in cryptography.

**Faked-State Attack:**

Mainly, Eve uses a replica of Bob’s photon detector and thus captures the photons intended for Bobby and further passed it to Bobby. Thus, Eve knows about the encoded bit, Bobby thinks that he received it from Amit.

**2) _____ and ______ protocol models can be extended to Entangled particles theory.**

- SARG04 and HTTP
- FTP and SSP
- SARG04 and SSP
- HTTP and FTP

**Answer:** c. SARG04 and SSP

**Explanation:**

SARG04 and SSP protocol models can be extended to Entangled particles theory.

**3) Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?**

- Quantum Solution
- Foreseen Solution
- Cryptographic Solution
- Block Cipher Solution

**Answer:** b) Foreseen Solution

**Explanation:**

As we study already that with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes the foreseen solution in this.

**4) Which two principles of quantum mechanics on which quantum cryptography are dependent?**

- Heisenberg Uncertainty Principle and Photon Polarization Principle.
- Fundamental Principle and Bohr's Model Principle
- Momentum Principle and Photons Principle
- Planck's Principle and Fundamental Principle

**Answer:** a. Heisenberg Uncertainty Principle and Photon Polarization Principle.

**Explanation:**

Quantum mechanics on which quantum cryptography depends are Heisenberg Uncertainty Principle and Photon Polarization Principle**.**

**5) How many elements are used in cryptography tools?**

- 1
- 4
- 6
- 3

**Answer:** d. 3

**Explanation:**

It has 3 elements as first is sender and second is the receiver and third is the channel in fact which connects both sender and receiver.

**More...**

- MCQ | Cryptography Basics
- MCQ | Cryptography Ciphers (Level: Easy) | Set 1
- MCQ | Cryptography Ciphers (Level: Easy) | Set 2
- MCQ | Cryptography Hash Functions (Level: Easy)
- MCQ | Cryptography Techniques of Block Cipher
- MCQ | Block Cipher as IDEA, DES, AES, RSA in Cryptography
- MCQ | Hash Function Technique
- MCQ | Modes of Operations in Block Cipher

TOP Interview Coding Problems/Challenges

- Run-length encoding (find/print frequency of letters in a string)
- Sort an array of 0's, 1's and 2's in linear time complexity
- Checking Anagrams (check whether two string is anagrams or not)
- Relative sorting algorithm
- Finding subarray with given sum
- Find the level in a binary tree with given sum K
- Check whether a Binary Tree is BST (Binary Search Tree) or not
- 1[0]1 Pattern Count
- Capitalize first and last letter of each word in a line
- Print vertical sum of a binary tree
- Print Boundary Sum of a Binary Tree
- Reverse a single linked list
- Greedy Strategy to solve major algorithm problems
- Job sequencing problem
- Root to leaf Path Sum
- Exit Point in a Matrix
- Find length of loop in a linked list
- Toppers of Class
- Print All Nodes that don't have Sibling
- Transform to Sum Tree
- Shortest Source to Destination Path

Comments and Discussions