This set of MCQ(multiple choice questions) focuses on the Foundations of Cryptography NPTEL Week 5 Assignment Solutions.
Course Layout (Answers Link)
- Week 1: Assignment answers
- Week 2: Assignment answers
- Week 3: Assignment answers
- Week 4: Assignment answers
- Week 5: Assignment answers
- Week 6: Assignment answers
- Week 7: Assignment answers
- Week 8: Assignment answers
- Week 9: Assignment answers
- Week 10: Assignment answers
- Week 11: Assignment answers
- Week 12: Assignment answers
NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Foundations of Cryptography NPTEL Week 5 Assignment Solution” contains 05 questions.
Now, start attempting the quiz.
Foundations of Cryptography NPTEL Week 5 Assignment Solutions
Q1. Choose the option(s) that is/are correct for AES
a) AES block cipher has a 128-bit block length and uses an 128-bit key
b) AES is a substitution-permutation network
c) AddRoundKey, SubBytes, ShiftRows, MixColumns are the four operations that are applied in a series of four stages
d) AES block cipher is proven to be secure against computationally bounded adversary
Answer: b), c)
Q2. Which of the following is(are) incorrect?
a) In a CCA attack, the adversary can ask for decryptions of any ciphertext of its choice
b) The CCA-security model captures a malicious adversary
c) The CCA-security model captures a passive adversary
d) Providing decryption-oracle to the adversary does not provide any additional power to the adversary
Answer: a), c), d)
Q3.
a) Given encryption scheme is single-message CCA secure.
b) Given encryption scheme is single-message CPA secure.
c) Given encryption scheme is neither CCA-secure, nor CPA-secure.
Answer: a), b)
Q4.
a) The construction is CMA-secure
b) The construction is SCMA-secure
c) The tag-generation algorithm is deterministic
d) The tag-generation algorithm is randomized
Answer: a), b), d)
Q5. Which of the following is/are false about Message Authentication Codes?
a) CBC MAC can be used to generate tag for only fixed-length messages
b) Block-wise CBC MAC initialized with IV=0^n, instead of IV being the number of message blocks is insecure
c) A secure MAC maintains the privacy of the underlying message
d) A secure MAC has to be always randomized
Answer: a), b), d)
<< Prev- Foundations of Cryptography NPTEL Week 4 Solutions
>> Next- Foundations of Cryptography NPTEL Week 6 Solution
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.
week 6 is going to be due tomorrow
Yes, adding soon!
Please send answers for week 6 quickly
Hi Paras,
Answers had been added for Week 6. Check it now.
Bro….week6 answers
Go to this page for answers: Cryptography Week 6 Answers
Bhai upload krdo week-6 🙏
Now, its uploaded. 🙂 Check Week 6 answers