mcq 队列_MCQ | 量子密码学

mcq 队列

1) Which possible Attacks in Quantum Cryptography can take place?

1)量子密码术中可能发生哪些攻击?

  1. Possible Attacks in Quantum Cryptography and Birthday Attack

    量子密码术和生日攻击的可能攻击

  2. Birthday attack and Boomerang attack

    生日袭击和回旋镖袭击

  3. Brute force attack and Faked-State-Attack

    蛮力攻击和伪造国家攻击

  4. Possible Attacks in Quantum Cryptography and Faked-State Attack

    量子密码术中的可能攻击和伪造态攻击

Answer: d. Possible Attacks in Quantum Cryptography and Faked-State Attack

答案: d。 量子密码术中的可能攻击和伪造态攻击

Explanation:

说明:

Photon Number Splitting (PNS) Attack:

光子数分裂(PNS)攻击:

As we know that it is not possible to send a single photon thus a pulse is sent. So, some of the photons from a pulse can be captured by Eve and after matching bits by Amit and Bobby, Eve can use the same polarizer as done by Bobby and thus get the key without being detected in cryptography.

众所周知,不可能发送单个光子,因此会发送脉冲。 因此,脉冲中的一些光子可以被Eve捕获,并且在Amit和Bobby匹配位后,Eve可以使用与Bobby相同的偏振器,从而获得密钥而无需在加密中被检测到。

Faked-State Attack:

伪造状态攻击:

Mainly, Eve uses a replica of Bob’s photon detector and thus captures the photons intended for Bobby and further passed it to Bobby. Thus, Eve knows about the encoded bit, Bobby thinks that he received it from Amit.

Eve主要使用Bob的光子检测器的副本,从而捕获打算用于Bobby的光子,并将其进一步传递给Bobby。 因此,夏娃知道编码位,鲍比认为他是从阿米特那里收到的。



2) _____ and ______ protocol models can be extended to Entangled particles theory.

2)_____和______协议模型可以扩展到纠缠粒子理论。

  1. SARG04 and HTTP

    SARG04和HTTP

  2. FTP and SSP

    FTP和SSP

  3. SARG04 and SSP

    SARG04和SSP

  4. HTTP and FTP

    HTTP和FTP

Answer: c. SARG04 and SSP

答: c。 SARG04和SSP

Explanation:

说明:

SARG04 and SSP protocol models can be extended to Entangled particles theory.

SARG04和SSP协议模型可以扩展到纠缠粒子理论。



3) Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?

3)有望与未来的量子计算机一起研究以解决离散对数问题,而诸如AES,RSA,DES,量子密码之类的众所周知的密码学方法将成为哪种解决方案?

  1. Quantum Solution

    量子解决方案

  2. Foreseen Solution

    预见的解决方案

  3. Cryptographic Solution

    密码解决方案

  4. Block Cipher Solution

    分组密码解决方案

Answer: b) Foreseen Solution

答案: b)可预见的解决方案

Explanation:

说明:

As we study already that with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes the foreseen solution in this.

正如我们已经研究的那样,随着人们期望未来的量子计算机能够解决离散对数问题以及诸如AES,RSA,DES之类的众所周知的加密方法,量子加密成为了可预见的解决方案。



4) Which two principles of quantum mechanics on which quantum cryptography are dependent?

4)量子密码学所依赖的量子力学的哪两个原理?

  1. Heisenberg Uncertainty Principle and Photon Polarization Principle.

    海森堡不确定性原理和光子极化原理。

  2. Fundamental Principle and Bohr's Model Principle

    基本原理和玻尔模型原理

  3. Momentum Principle and Photons Principle

    动量原理和光子原理

  4. Planck's Principle and Fundamental Principle

    普朗克原理和基本原理

Answer: a. Heisenberg Uncertainty Principle and Photon Polarization Principle.

答: 海森堡不确定性原理和光子极化原理。

Explanation:

说明:

Quantum mechanics on which quantum cryptography depends are Heisenberg Uncertainty Principle and Photon Polarization Principle.

量子密码学所依赖的量子力学是海森堡不确定原理和光子极化原理



5) How many elements are used in cryptography tools?

5)密码学工具中使用了多少个元素?

  1. 1

    1个

  2. 4

    4

  3. 6

    6

  4. 3

    3

Answer: d. 3

答案: d。 3

Explanation:

说明:

It has 3 elements as first is sender and second is the receiver and third is the channel in fact which connects both sender and receiver.

它具有3个元素,第一个是发送者,第二个是接收者,第三个是实际上连接发送者和接收者的通道。



翻译自: https://www.includehelp.com/cryptography/mcq-quantum-cryptography.aspx

mcq 队列

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值