• Tidak ada hasil yang ditemukan

Unit 9 - Week-8 - Nptel

N/A
N/A
Protected

Academic year: 2024

Membagikan "Unit 9 - Week-8 - Nptel"

Copied!
4
0
0

Teks penuh

(1)

26/07/2020 Quantum Information and Computing - - Unit 9 - Week-8

https://onlinecourses-archive.nptel.ac.in/noc17_ph05/unit?unit=73&assessment=101 1/4 X

Courses » Quantum Information and Computing

Unit 9 - Week-8

[email protected]

Announcements Course Ask a Question Progress

Course outline

How to access the portal ? Week-1 Week-2 Week 3 Week 4 Week 5 Week 6 Week 7

Week-8

Cryptography- RSA Algorithm-I Cryptography- RSA Algorithm- II

Quantum Cryptography-I Quantum Cryptography-II Experimental Aspects of Quantum Computing - I Experimental Aspects of Quantum Computing - II Quiz : Week 8 - Assignment 8 Week 8 - Assignment 8 Solutions

Due on 2017-09-20, 23:59 IST.

1 point 1)

1 point 2)

1 point 3)

1 point 4)

Week 8 - Assignment 8

The due date for submitting this assignment has passed.

As per our records you have not submitted this assignment.

In the following questions, ONLY ONE answer is correct. Choose the most appropriate one. (1X10=10 Marks)

Euler’s Totient function Φ(1200) is 280

300 320 380

No, the answer is incorrect.

Score: 0

Accepted Answers:

320

Inverse of 5 modulo 101 is

No, the answer is incorrect.

Score: 0

Accepted Answers:

Solution of 5x=31 mod 101 is

27 42 68 87

No, the answer is incorrect.

Score: 0

Accepted Answers:

87

The set of equations 2x=5 (mod 7) and 3x=4 mod 8 has the solution

 (𝑚𝑜𝑑 101) 5

99

 (𝑚𝑜𝑑 101) 5

100

 (𝑚𝑜𝑑 101) 5

102

𝑛𝑜𝑛𝑒

 (𝑚𝑜𝑑 101)

5

99

(2)

26/07/2020 Quantum Information and Computing - - Unit 9 - Week-8

https://onlinecourses-archive.nptel.ac.in/noc17_ph05/unit?unit=73&assessment=101 2/4 1 point 5)

1 point 6)

1 point 7)

1 point 8)

1 point 9)

24 mod 56 20 mod 56 both (A) and (B) none

No, the answer is incorrect.

Score: 0

Accepted Answers:

20 mod 56

In RSA algorithm with N=323, which of the following is acceptable as an encryption key e?

18 16 13 9

No, the answer is incorrect.

Score: 0

Accepted Answers:

13

In an RSA encryption with the public key (N=187, e=7), what is the private key d for decrypting the message?

80 23 17 11

No, the answer is incorrect.

Score: 0

Accepted Answers:

23

Let p and q be two prime numbers p=137 and q=131 so that the number N=pq=17947. If RSA encryption we choose e= 3, the decryption key d is

5893 5982 11787 11965

No, the answer is incorrect.

Score: 0

Accepted Answers:

11787

In BB-84 protocol, assuming the presence of Eve in the channel and further assuming that Alice, Bob and Eve randomly select a horizontal/vertical or diagonal basis for their measurements, the fraction of cases (on an average) where Alice’s and Bob’s bits would agree, before they have compared their bases is

5/8 1/2 3/8 3/16

No, the answer is incorrect.

Score: 0

Accepted Answers:

5/8

In an NMR quantum computer the molecule used has nuclei of

(3)

26/07/2020 Quantum Information and Computing - - Unit 9 - Week-8

https://onlinecourses-archive.nptel.ac.in/noc17_ph05/unit?unit=73&assessment=101 3/4 1 point 10)

2 points 11)

2 points 12)

2 Flourine, 5 Carbon 2 Fluorine, 5 protons 5 Carbon, 2 protons 5 Fluorine, 2 Carbon No, the answer is incorrect.

Score: 0

Accepted Answers:

5 Fluorine, 2 Carbon

Alice and Bob are using B-92 protocol for communication. Alice encodes her bit 0 as |0⟩ and bit 1 as |+⟩=(|0⟩+|1⟩)/√2. The two bases that Alice uses are designated as basis number 0 and 1 respectively. Bob tosses a coin and if he gets a head, he measures the received state in the

computational basis (labelled basis 0) and if he gets a tail he measures it in the diagonal basis (labelled basis 1). The result of Bob’s measurement is publicly announced as |+⟩|-⟩|1⟩|0⟩ -- |1⟩|+⟩|-⟩|+⟩ --

|1⟩|+⟩|+⟩|1⟩ -- |-⟩|-⟩|0⟩|+⟩ (the dashes in the above string are for reading clarity only). The secret code they establish in the process is

10100011 10100011 01011000 01101100

No, the answer is incorrect.

Score: 0

Accepted Answers:

01101100

In the following questions, ONE or MORE answer(s) is (are correct).

Choose all the appropriate ones. (2X2=4 Marks)

In BB-84 protocol

Alice sends original bit string to Bob over a public (classical) channel.

Alice sends original bit string to Bob over a quantum channel

Comparison of bases of Alice and Bob occurs over a quantum channel Comparison of bases of Alice and Bob occurs over a public channel No, the answer is incorrect.

Score: 0

Accepted Answers:

Alice sends original bit string to Bob over a quantum channel Comparison of bases of Alice and Bob occurs over a public channel

Which of the following statements is (are) true about practical realization of a quantum computer?

Trapping of ions is done by application of electrostatic field only

For an quantum computer to be realized, a set of single qubit and two qubit gates must be implemented

In an NMR computer, the initial state is thermally populated

According to Di Vincenzo’s additional criterion, flying qubits must be faithfully transmitted between specified locations

No, the answer is incorrect.

Score: 0

Accepted Answers:

For an quantum computer to be realized, a set of single qubit and two qubit gates must be implemented In an NMR computer, the initial state is thermally populated

According to Di Vincenzo’s additional criterion, flying qubits must be faithfully transmitted between specifie locations

(4)

26/07/2020 Quantum Information and Computing - - Unit 9 - Week-8

https://onlinecourses-archive.nptel.ac.in/noc17_ph05/unit?unit=73&assessment=101 4/4

Previous Page End

A project of In association with

Funded by

Powered by

© 2014 NPTEL - Privacy & Terms - Honor Code - FAQs -

Referensi

Dokumen terkait

Score: 0 Accepted Answers: Option b : They would have the same total depth of teeth During turning on the lathe, machining time can be halved while retaining same surface finish if

Score: 0 Accepted Answers: b 0.01% Which one is not true for TDMA algorithm a It uses recursive relation b The number of operations are usually less than Gauss elimination c TDMA

Score: 0 Accepted Answers: d a,b,c are all zero If A has all independent column, what can be said A.x=b a Unique solution b Solution exists for certain condition of b c Infinite

Score: 0 Accepted Answers: Hanging wall, Foot wall Seismic zonation __________ is designated to Himalayan mountain belt and the most devastating earthquake till date in this region