MODD / Mr. Hansen |
Name:
_________________________ |
Multi-Unit Test on Cryptography, Error Correcting
Codes, and Information Theory
Time limit: 32 minutes (48 minutes for extended
time). A calculator is permitted.
Each question is worth 5 points, except for #18 at the end. Your name is worth
3 points.
Instructions for Part I: For multiple choice questions, write the capital
letter of the best choice in the
blank provided. For fill-in problems, write the word or phrase that best fits
in the space provided.
___ 1. |
The father of information
theory was . . . |
|
|
(A) Shannon |
(D) Gates |
|
|
|
___ 2. |
The key term in information
theory, defined by the formula –S pi
log2 pi , is
. . . |
|
|
(A) compressibility |
(D) noise |
|
|
|
___ 3. |
Which of the following bitstreams appears to be the most compressible? |
|
|
(A)
1111111111111000000000000000 |
(D)
0001001010001000111011110111 |
|
|
|
___ 4. |
High compressibility is
associated with . . . |
|
|
(A) low surprisal,
i.e., low entropy |
(D) high surprisal, i.e., high entropy |
|
|
|
___ 5. |
What is the
probability-weighted mean surprisal of English
text? |
|
|
(A) fewer than 3 bits per
symbol |
|
|
|
|
___ 6. |
What in the world do error
correcting codes have to do with metric spaces? |
|
|
(A) Nothing. |
|
|
|
|
___ 7. |
For this question, assume
that there is no compression. A transmission that includes error correcting
codes will always be . . . |
|
|
(A) longer than the
original raw data (plaintext), because of overhead |
Instructions for Part II: Fill in the blanks for each question. The answers can
be quite short.
8. |
Write a four-word
definition of entropy. |
|
|
|
________________ -
________________ ________________ ________________ |
|
|
9-11. |
Let f be an encryption function. Then f (x), where x is a plaintext data block, denotes |
|
|
12. |
If f and g are two encryption
functions such that f (g(x))
= g(f (x)), then we say
that the |
|
|
13-14. |
Let f and g be two
private-key encryption algorithms that commute. A message m encrypted using both keys can be
denoted _______________ . Prove that the order in which the recipient applies
the decryption keys, namely f –1
and g–1, does not
matter. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15. |
The letters PKI stand for
________________________________________________ . |
|
|
16. |
The U.S. agency responsible
for all codemaking and codebreaking
is the __________ . |
|
|
17. |
How many different symbols
are involved in bioinformatics, usually? Why? |
|
|
|
|
|
|
18. |
(a) Which has more entropy,
compressible plaintext or encrypted data of the same source? |
|
|
|
|
|
|
|
|
BONUS |
Explain (c) briefly. |