Foundations of Cryptography | NPTEL | Week 5 Assignment Solutions

This set of MCQ(multiple choice questions) focuses on the Foundations of Cryptography NPTEL Week 5 Assignment Solutions.

Course Layout (Answers Link)

NOTE: You can check your answer immediately by clicking show answer button. Moreover, this set of “Foundations of Cryptography NPTEL Week 5 Assignment Solution” contains 05 questions.

Now, start attempting the quiz.

Foundations of Cryptography NPTEL Week 5 Assignment Solutions

Q1. Choose the option(s) that is/are correct for AES

a) AES block cipher has a 128-bit block length and uses an 128-bit key
b) AES is a substitution-permutation network
c) AddRoundKey, SubBytes, ShiftRows, MixColumns are the four operations that are applied in a series of four stages
d) AES block cipher is proven to be secure against computationally bounded adversary

Answer: b), c)

Q2. Which of the following is(are) incorrect?

a) In a CCA attack, the adversary can ask for decryptions of any ciphertext of its choice
b) The CCA-security model captures a malicious adversary
c) The CCA-security model captures a passive adversary
d) Providing decryption-oracle to the adversary does not provide any additional power to the adversary

Answer: a), c), d)

Q3.

a) Given encryption scheme is single-message CCA secure.
b) Given encryption scheme is single-message CPA secure.
c) Given encryption scheme is neither CCA-secure, nor CPA-secure.

Answer: a), b)

Q4.

a) The construction is CMA-secure
b) The construction is SCMA-secure
c) The tag-generation algorithm is deterministic
d) The tag-generation algorithm is randomized

Answer: a), b), d)

Q5. Which of the following is/are false about Message Authentication Codes?

a) CBC MAC can be used to generate tag for only fixed-length messages
b) Block-wise CBC MAC initialized with IV=0^n, instead of IV being the number of message blocks is insecure
c) A secure MAC maintains the privacy of the underlying message
d) A secure MAC has to be always randomized

Answer: a), b), d)

Foundations of Cryptography NPTEL Week 5 Assignment Solutions

<< Prev- Foundations of Cryptography NPTEL Week 4 Solutions

>> Next- Foundations of Cryptography NPTEL Week 6 Solution

DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

8 thoughts on “Foundations of Cryptography | NPTEL | Week 5 Assignment Solutions”

Leave a Comment

Your email address will not be published. Required fields are marked *