700字范文,内容丰富有趣,生活中的好帮手!
700字范文 > mcq 队列_MCQ | 量子密码学

mcq 队列_MCQ | 量子密码学

时间:2020-07-30 15:27:47

相关推荐

mcq 队列_MCQ | 量子密码学

mcq 队列

1) Which possible Attacks in Quantum Cryptography can take place?

1)量子密码术中可能发生哪些攻击?

Possible Attacks in Quantum Cryptography and Birthday Attack

量子密码术和生日攻击的可能攻击

Birthday attack and Boomerang attack

生日袭击和回旋镖袭击

Brute force attack and Faked-State-Attack

蛮力攻击和伪造国家攻击

Possible Attacks in Quantum Cryptography and Faked-State Attack

量子密码术中的可能攻击和伪造态攻击

Answer:d. Possible Attacks in Quantum Cryptography and Faked-State Attack

答案:d。 量子密码术中的可能攻击和伪造态攻击

Explanation:

说明:

Photon Number Splitting (PNS) Attack:

光子数分裂(PNS)攻击:

As we know that it is not possible to send a single photon thus a pulse is sent. So, some of the photons from a pulse can be captured by Eve and after matching bits by Amit and Bobby, Eve can use the same polarizer as done by Bobby and thus get the key without being detected in cryptography.

众所周知,不可能发送单个光子,因此会发送脉冲。 因此,脉冲中的一些光子可以被Eve捕获,并且在Amit和Bobby匹配位后,Eve可以使用与Bobby相同的偏振器,从而获得密钥而无需在加密中被检测到。

Faked-State Attack:

伪造状态攻击:

Mainly, Eve uses a replica of Bob’s photon detector and thus captures the photons intended for Bobby and further passed it to Bobby. Thus, Eve knows about the encoded bit, Bobby thinks that he received it from Amit.

Eve主要使用Bob的光子检测器的副本,从而捕获打算用于Bobby的光子,并将其进一步传递给Bobby。 因此,夏娃知道编码位,鲍比认为他是从阿米特那里收到的。

2) _____ and ______ protocol models can be extended to Entangled particles theory.

2)_____和______协议模型可以扩展到纠缠粒子理论。

SARG04 and HTTP

SARG04和HTTP

FTP and SSP

FTP和SSP

SARG04 and SSP

SARG04和SSP

HTTP and FTP

HTTP和FTP

Answer:c. SARG04 and SSP

答:c。 SARG04和SSP

Explanation:

说明:

SARG04 and SSP protocol models can be extended to Entangled particles theory.

SARG04和SSP协议模型可以扩展到纠缠粒子理论。

3) Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?

3)有望与未来的量子计算机一起研究以解决离散对数问题,而诸如AES,RSA,DES,量子密码之类的众所周知的密码学方法将成为哪种解决方案?

Quantum Solution

量子解决方案

Foreseen Solution

预见的解决方案

Cryptographic Solution

密码解决方案

Block Cipher Solution

分组密码解决方案

Answer:b) Foreseen Solution

答案:b)可预见的解决方案

Explanation:

说明:

As we study already that with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes the foreseen solution in this.

正如我们已经研究的那样,随着人们期望未来的量子计算机能够解决离散对数问题以及诸如AES,RSA,DES之类的众所周知的加密方法,量子加密成为了可预见的解决方案。

4) Which two principles of quantum mechanics on which quantum cryptography are dependent?

4)量子密码学所依赖的量子力学的哪两个原理?

Heisenberg Uncertainty Principle and Photon Polarization Principle.

海森堡不确定性原理和光子极化原理。

Fundamental Principle and Bohr's Model Principle

基本原理和玻尔模型原理

Momentum Principle and Photons Principle

动量原理和光子原理

Planck's Principle and Fundamental Principle

普朗克原理和基本原理

Answer:a. Heisenberg Uncertainty Principle and Photon Polarization Principle.

答:海森堡不确定性原理和光子极化原理。

Explanation:

说明:

Quantum mechanics on which quantum cryptography depends are Heisenberg Uncertainty Principle and Photon Polarization Principle.

量子密码学所依赖的量子力学是海森堡不确定原理和光子极化原理

5) How many elements are used in cryptography tools?

5)密码学工具中使用了多少个元素?

1

1个

4

4

6

6

3

3

Answer:d. 3

答案:d。 3

Explanation:

说明:

It has 3 elements as first is sender and second is the receiver and third is the channel in fact which connects both sender and receiver.

它具有3个元素,第一个是发送者,第二个是接收者,第三个是实际上连接发送者和接收者的通道。

翻译自: /cryptography/mcq-quantum-cryptography.aspx

mcq 队列

本内容不代表本网观点和政治立场,如有侵犯你的权益请联系我们处理。
网友评论
网友评论仅供其表达个人看法,并不表明网站立场。