NPTEL Ethical Hacking Week 10 Assignment Answers 2024
1. Which of the following can be used as countermeasures to prevent hardware-based attacks?
a. Encrypt data stored in register and buses.
b. Add dummy circuit to generate random noise.
c. Provide authentication using PUF.
d. Use secure cryptographic algorithm
Answer :- For Answers Click Here
2. Which of the following statement(s) is/are false for side channel attacks?
a. They exploit some weakness in the algorithm.
b. They exploit some weakness in the implementation of the algorithm.
c. They require physical access to the device.
d. They only require the set of inputs/outputs to the algorithm.
Answer :- For Answers Click Here
3. Which of the following is/are typically exploited in side-channel attacks?
a. Electromagnetic emissions.
b. Timing analysis of an operation.
c. Space complexity of an algorithm.
d. Power consumed during computation.
e. All of these.
Answer :- For Answers Click Here
4. For modular exponentiation computation of x13, how many squaring and multiplication operations would be required?
a. 3 and 2.
b. 3 and 3.
c. 3 and 4.
d. 4 and 2.
Answer :-
5. What does power analysis do?
a. It measures variation in power consumption during a computation.
b. It attacks the power supply and feeds new power supply to the circuit.
c. It relies on the use of a hardware Trojan in the circuit.
d. All of these.
Answer :-
6. Which of the following statements describes the unclonable property of PUF?
a. Given a PUF, it is hard to construct a procedure PUF’, where PUF # PUF’, and PUF'(x) = PUF(x) for all x.
b. Given only y and corresponding PUF instance, it is hard to find x such that PUF(x) = y.
c. Given PUF and x, it should be easy to evaluate y = PUF(x).
d. None of these.
Answer :- For Answers Click Here
7. Which of the following is/are applications of PUF?
a. Identification.
b. Key generation.
c. Side channel analysis.
d. Power analysis.
e. None of these.
Answer :-
8. Consider the following statements:
(i) Hardware Trojans are small modifications in the circuit.
(ii) Hardware Trojans can be used for defensive purpose.
a. Only (i) is true.
b. Only (i) is true.
c. Both (6) and ii) are true.
d. Both (i) and (ii) are false.
Answer :-
9. In which of the following lifecycle stage(s) of an IC, insertion of the Hardware Trojan is not possible?
a. Specification.
b. Deployment.
c. Fabrication.
d. None of these.
Answer :-
10. Which of the following statements) is/are true about Hardware Trojan?
a. It cannot replicate itself.
b. It is difficult to detect.
c. It does nothing harmful to the user’s computer system.
d. None of these.
Answer :- For Answers Click Here