This set of MCQ(multiple choice questions) focuses on the Foundations of Cryptography NPTEL Week 8 Assignment Solutions.
Course Layout (Answers Link)
- Week 1: Assignment answers
- Week 2: Assignment answers
- Week 3: Assignment answers
- Week 4: Assignment answers
- Week 5: Assignment answers
- Week 6: Assignment answers
- Week 7: Assignment answers
- Week 8: Assignment answers
- Week 9: Assignment answers
- Week 10: Assignment answers
- Week 11: Assignment answers
- Week 12: Assignment answers
NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Foundations of Cryptography NPTEL Week 8 Assignment Solution” contains 05 questions.
Now, start attempting the quiz.
Foundations of Cryptography NPTEL Week 8 Assignment Solutions
Q1. Choose the right option(s) for the authenticate-then-encrypt approach which is instantiated with a CPA-secure encryption scheme and an SCMA-secure MAC:
a) It is CCA-secure but not an authenticated encryption scheme
b) It does not provide ciphertext integrity
c) It provides ciphertext integrity
d) It is not CCA-secure
Answer: b), d)
Q2. In the key-exchange problem, the goal of the sender and receiver is to:
a) Agree upon a common public key, over a private channel
b) Agree upon a fixed common key, over a public channel
c) Agree upon a fixed common key, over a private channel
d) Agree upon a random common key, over a public channel
Answer: d)
Q3. Which of the following is/are sufficient to build an authenticated encryption scheme?
a) A block cipher
b) A PRG
c) A hash function
d) All of these
Answer: a), b)
Q4.
a) The above MAC is randomized and hence is SCMA-secure
b) The above MAC is deterministic and hence is CMA-secure
c) The above MAC when used in the encrypt-then-authenticate approach leads to an authenticated encryption scheme
d) The above MAC when used in the encrypt-and-authenticate approach leads to an authenticated encryption scheme
Answer: a), b), c), d)
Q5.
a) Function F’ is not a secure PRF
b) Function F’ is a secure PRF
c) Function F’ when used directly leads to a CMA-secure MAC
d) Function F’ when used directly does not lead to a CMA-secure MAC
Answer: a), d)
<< Prev- Foundations of Cryptography NPTEL Week 7 Solutions
>> Next- Foundations of Cryptography NPTEL Week 9 Solution
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.
Pls put week9 answers…today is the last day for submission
hurry up please submit assignment 9