mcq 隊列
1) Which possible Attacks in Quantum Cryptography can take place?
1)量子密碼術中可能發生哪些攻擊?
Possible Attacks in Quantum Cryptography and Birthday Attack
量子密碼術和生日攻擊的可能攻擊
Birthday attack and Boomerang attack
生日襲擊和回旋鏢襲擊
Brute force attack and Faked-State-Attack
蠻力攻擊和偽造國家攻擊
Possible Attacks in Quantum Cryptography and Faked-State Attack
量子密碼術中的可能攻擊和偽造態攻擊
Answer: d. Possible Attacks in Quantum Cryptography and Faked-State Attack
答案: d。 量子密碼術中的可能攻擊和偽造態攻擊
Explanation:
說明:
Photon Number Splitting (PNS) Attack:
光子數分裂(PNS)攻擊:
As we know that it is not possible to send a single photon thus a pulse is sent. So, some of the photons from a pulse can be captured by Eve and after matching bits by Amit and Bobby, Eve can use the same polarizer as done by Bobby and thus get the key without being detected in cryptography.
眾所周知,不可能發送單個光子,因此會發送脈沖。 因此,脈沖中的一些光子可以被Eve捕獲,并且在Amit和Bobby匹配位后,Eve可以使用與Bobby相同的偏振器,從而獲得密鑰而無需在加密中被檢測到。
Faked-State Attack:
偽造狀態攻擊:
Mainly, Eve uses a replica of Bob’s photon detector and thus captures the photons intended for Bobby and further passed it to Bobby. Thus, Eve knows about the encoded bit, Bobby thinks that he received it from Amit.
Eve主要使用Bob的光子檢測器的副本,從而捕獲打算用于Bobby的光子,并將其進一步傳遞給Bobby。 因此,夏娃知道編碼位,鮑比認為他是從阿米特那里收到的。
2) _____ and ______ protocol models can be extended to Entangled particles theory.
2)_____和______協議模型可以擴展到糾纏粒子理論。
SARG04 and HTTP
SARG04和HTTP
FTP and SSP
FTP和SSP
SARG04 and SSP
SARG04和SSP
HTTP and FTP
HTTP和FTP
Answer: c. SARG04 and SSP
答: c。 SARG04和SSP
Explanation:
說明:
SARG04 and SSP protocol models can be extended to Entangled particles theory.
SARG04和SSP協議模型可以擴展到糾纏粒子理論。
3) Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?
3)有望與未來的量子計算機一起研究以解決離散對數問題,而諸如AES,RSA,DES,量子密碼之類的眾所周知的密碼學方法將成為哪種解決方案?
Quantum Solution
量子解決方案
Foreseen Solution
預見的解決方案
Cryptographic Solution
密碼解決方案
Block Cipher Solution
分組密碼解決方案
Answer: b) Foreseen Solution
答案: b)可預見的解決方案
Explanation:
說明:
As we study already that with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes the foreseen solution in this.
正如我們已經研究的那樣,隨著人們期望未來的量子計算機能夠解決離散對數問題以及諸如AES,RSA,DES之類的眾所周知的加密方法,量子加密成為了可預見的解決方案。
4) Which two principles of quantum mechanics on which quantum cryptography are dependent?
4)量子密碼學所依賴的量子力學的哪兩個原理?
Heisenberg Uncertainty Principle and Photon Polarization Principle.
海森堡不確定性原理和光子極化原理。
Fundamental Principle and Bohr's Model Principle
基本原理和玻爾模型原理
Momentum Principle and Photons Principle
動量原理和光子原理
Planck's Principle and Fundamental Principle
普朗克原理和基本原理
Answer: a. Heisenberg Uncertainty Principle and Photon Polarization Principle.
答: 海森堡不確定性原理和光子極化原理。
Explanation:
說明:
Quantum mechanics on which quantum cryptography depends are Heisenberg Uncertainty Principle and Photon Polarization Principle.
量子密碼學所依賴的量子力學是海森堡不確定原理和光子極化原理。
5) How many elements are used in cryptography tools?
5)密碼學工具中使用了多少個元素?
1
1個
4
4
6
6
3
3
Answer: d. 3
答案: d。 3
Explanation:
說明:
It has 3 elements as first is sender and second is the receiver and third is the channel in fact which connects both sender and receiver.
它具有3個元素,第一個是發送者,第二個是接收者,第三個是實際上連接發送者和接收者的通道。
翻譯自: https://www.includehelp.com/cryptography/mcq-quantum-cryptography.aspx
mcq 隊列