Public Key Cryptography MCQ Questions And Answers
This section focuses on "Public Key Cryptography" in Blockchain. These Multiple Choice Questions (MCQ) should be practiced to improve the Blockchain skills required for various interviews (campus interviews, walk-in interviews, company interviews), placements, entrance exams and other competitive examinations.
1. Public-key cryptography is also known as ?
A. asymmetric cryptography
B. symmetric cryptography
C. Both A and B
D. None of the above
View Answer
Ans : A
Explanation: Public-key cryptography is also known as asymmetric cryptography.
2. Which of the following keys are known only to the owner?
A. public key
B. protected key
C. private key
D. unique key
View Answer
Ans : C
Explanation: public keys, which may be disseminated widely, and private keys, which are known only to the owner.
3. How many function PKI accomplies?
A. 1
B. 2
C. 3
D. 4
View Answer
Ans : B
Explanation: The PKI accomplies two functions : authentication and the message privacy through encryption/decryption mechanism
4. PKI stands for?
A. public key infrastructure
B. private key infrastructure
C. public key instance
D. private key instance
View Answer
Ans : A
Explanation: PKI stands for public key infrastructure in which one or more third parties – known as certificate authorities - certify ownership of key pairs.
5. A communication is said to be insecure where data is transmitted in a manner that allows for interception also called?
A. attack
B. sniffing
C. ISP
D. citation
View Answer
Ans : B
Explanation: A communication is said to be insecure where data is transmitted in a manner that allows for interception also called "sniffing".
6. Knapsack problem can be solved by
A. Public key cryptosystem
B. Private key cryptosystem
C. Both A and B
D. Unique key cryptosystem
View Answer
Ans : A
Explanation: The knapsack problem can be solved by public key cryptosystem system using knapsack vector and data vector.
7. Examples of hash functions are
A. MD5
B. SHA-1
C. Both A and B
D. None of the above
View Answer
Ans : C
Explanation: Some examples of hash functions are MD5 and SHA-1.
8. Which has a key length of 128 bits?
A. IDEA
B. Triple-DES
C. Both A and B
D. RSA
View Answer
Ans : C
Explanation: Triple-DES uses 168 bit key size and IDEA and CAST uses 128 bits key length.
9. Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption.
A. Messages, session key
B. Session key, messages
C. Can be used for both
D. None of the above
View Answer
Ans : A
Explanation: Private key algorithm is used for encryption of messages and public key algorithm is used for encryption of session keys.
10. In public key cryptosystem which is kept as public?
A. Decryption keys
B. Encryption keys
C. Encryption & Decryption keys
D. None of the above
View Answer
Ans : B
Explanation: In public key cryptosystem, the encryption keys are kept as public where as decryption keys are kept as secret.
Discussion