MODD / Mr. Hansen |
Name:
_________________________ |
Multi-Unit Test on Cryptography, Error Correcting Codes,
and Information Theory
Time limit: 32 minutes (48 minutes for extended
time). A calculator is permitted.
Each question is worth 5 points, except for those at the end. Your name is
worth 3 points.
Instructions for Part I: For multiple choice questions, write the capital
letter of the best choice in the
blank provided. For fill-in problems, write the word or phrase that best fits
in the space provided.
___ 1. |
What does Nyquist’s Theorem have to do with information theory? |
|
|
(A) Nothing. |
|
|
|
|
___ 2. |
Entropy, defined by the
formula –S pi log2 pi
, is measured in what units? |
|
|
(A) bits |
(D) bits per symbol |
|
|
|
___ 3. |
Which of the following hex
data blocks appears to have the greatest surprisal? |
|
|
(A) 0x0000000000000000 |
(D) 0x00000000FFFFFFFF |
|
|
|
___ 4. |
High compressibility is
associated with . . . |
|
|
(A) low surprisal,
i.e., low entropy |
(D) high surprisal, i.e., high entropy |
|
|
|
___ 5. |
Let A and B be defined as
follows: |
|
|
|
|
|
(A) A = B |
(D) A = 4B |
___ 6. |
What in the world do error
correcting codes have to do with metric spaces? |
|
(A) Nothing. |
|
|
___ 7. |
Assume that there is no
data compression. A transmission that includes error correcting codes will
always be . . . |
|
(A) longer than the
original raw data (plaintext), because of overhead |
Instructions for Part II: Fill in the blanks for each question. The answers can
be quite short.
8. |
Write a four-word
definition of entropy. |
|
|
|
|
|
________________ -
________________ ________________ ________________ |
|
|
|
|
9. |
Symmetric-key cryptography is sometimes used as a term to refer to which of
these? |
|
|
(A) private-key
cryptosystems |
(D) cryptanalysis |
|
|
|
10. |
A one-way function is a
function that ______________________________________ |
|
|
|
|
11. |
Explain briefly why
multiplying two large prime integers is an example of a one-way function. |
|
|
|
|
12-14. |
Let f be an encryption function. Then f (x), where x is a plaintext data block, denotes |
15. |
If f and g are two
encryption functions such that f (g(x))
= g(f (x)), then we say
that the |
|
|
|
|
16-17. |
Let f and g be two private-key
encryption algorithms that commute. A message m encrypted using both keys can be denoted _______________ .
Prove that the order in which the recipient applies the decryption keys,
namely f –1 and g–1, does not matter. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
18. |
The letters RSA are most
closely associated with which of the following? |
|
|
(A) triple-DES |
(D) NSA |
|
|
|
19. |
The simplest type of error
detection protocol (with no correction) is . . . |
|
|
(A) cyclic redundancy check |
|
|
|
|
20. |
In #19, if an error is detected,
what should the protocol cause to happen? |
|
|
(A) drop connection |