# MCQ | Quantum Cryptography

Here, we have a set of multiple-choice questions and answers (quiz) on Quantum Cryptography.
Submitted by Monika Sharma, on March 23, 2020

1) Which possible Attacks in Quantum Cryptography can take place?

1. Possible Attacks in Quantum Cryptography and Birthday Attack
2. Birthday attack and Boomerang attack
3. Brute force attack and Faked-State-Attack
4. Possible Attacks in Quantum Cryptography and Faked-State Attack

Answer: d. Possible Attacks in Quantum Cryptography and Faked-State Attack

Explanation:

Photon Number Splitting (PNS) Attack:

As we know that it is not possible to send a single photon thus a pulse is sent. So, some of the photons from a pulse can be captured by Eve and after matching bits by Amit and Bobby, Eve can use the same polarizer as done by Bobby and thus get the key without being detected in cryptography.

Faked-State Attack:

Mainly, Eve uses a replica of Bob’s photon detector and thus captures the photons intended for Bobby and further passed it to Bobby. Thus, Eve knows about the encoded bit, Bobby thinks that he received it from Amit.

2) _____ and ______ protocol models can be extended to Entangled particles theory.

1. SARG04 and HTTP
2. FTP and SSP
3. SARG04 and SSP
4. HTTP and FTP

Explanation:

SARG04 and SSP protocol models can be extended to Entangled particles theory.

3) Study with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes which solution?

1. Quantum Solution
2. Foreseen Solution
3. Cryptographic Solution
4. Block Cipher Solution

Explanation:

As we study already that with quantum computers of future being expected to solve the discrete logarithmic problem and the popularly know cryptography methods such as AES, RSA, DES, quantum cryptography becomes the foreseen solution in this.

4) Which two principles of quantum mechanics on which quantum cryptography are dependent?

1. Heisenberg Uncertainty Principle and Photon Polarization Principle.
2. Fundamental Principle and Bohr's Model Principle
3. Momentum Principle and Photons Principle
4. Planck's Principle and Fundamental Principle

Answer: a. Heisenberg Uncertainty Principle and Photon Polarization Principle.

Explanation:

Quantum mechanics on which quantum cryptography depends are Heisenberg Uncertainty Principle and Photon Polarization Principle.

5) How many elements are used in cryptography tools?

1. 1
2. 4
3. 6
4. 3

Explanation:

It has 3 elements as first is sender and second is the receiver and third is the channel in fact which connects both sender and receiver.

More...