This set of MCQ(multiple choice questions) focuses on the **Foundations of Cryptography** **NPTEL Week 10 Assignment Solutions**.

### Course Layout (Answers Link)

- Week 1:
**Assignment answers** - Week 2:
**Assignment answers** - Week 3:
**Assignment answers** - Week 4:
**Assignment answers** - Week 5:
**Assignment answers** - Week 6:
**Assignment answers** - Week 7:
**Assignment answers** - Week 8:
**Assignment answers** - Week 9:
**Assignment answers** - Week 10:
**Assignment answers** - Week 11:
**Assignment answers** - Week 12:
**Assignment answers**

**NOTE:** You can check your answer immediately by clicking show answer button. Moreover, this set of “**Foundations of Cryptography** NPTEL Week 10 Assignment Solution” contains 05 questions.

Now, start attempting the quiz.

**Foundations of Cryptography** NPTEL Week 10 Assignment Solutions

**Q1.**

**Answer:** a)

**Q2.** Suppose in RSA cryptosystem, we have an e, which has at least one 0 in its binary representation. Now let e’ be another RSA public key, obtained by flipping one of the 0 bit in the binary representation of e to 1. Then

a) e and e’ are coprime

b) e and e’ are not coprime

c) e’ will be even

d) None of the above

**Answer:** a)

**Q3.** Suppose the El Gamal encryption scheme parameter-generation algorithms outputs safe prime (p,q) and the public-key (g,h), where g is the generator of a prime-order subgroup G of Z_{p}^{⋆}, where the order of G is q.

a) For CPA-security, the plaintext space has to be necessarily G

b) For CPA-security, the plaintext space does not matter

c) The scheme will not be COA-secure, if the plaintext space is Z_{p}^{⋆}

d) It is sufficient to have plaintext space as Z_{p}^{⋆} for COA-security

**Answer:** a), c)

**Q4.**

a) From the view point of the adversary, the output key is uniformly random and unknown

b) The adversary will completely know the underlying output key

c) From the view point of the adversary, the output key will be pseudorandom

d) None of the these

**Answer:** b)

**Q5. **

a) Function f is collision-resistant, provided CDH assumption holds in G

b) Function f is not collision-resistant

c) Function f is collision-resistant, provided DDH assumption holds in G

d) Function f is collision-resistant, provided DLog assumption holds in G

**Answer:** b)

**<< Prev- Foundations of Cryptography NPTEL Week 8 Solutions**

**>> Next- Foundations of Cryptography NPTEL Week 11 Solution**

DISCLAIMER:Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

*For discussion about any question, join the below comment section. And get the solution of your query.* Also, try to share your thoughts about the topics covered in this particular quiz.