0% found this document useful (0 votes)
134 views2 pages

Blockchain and Its Applications Assignment 1 Answers

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
134 views2 pages

Blockchain and Its Applications Assignment 1 Answers

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

NOC22-CS44: Blockchain and Its Applications

Assignment 1

Correct choices are highlighted in Yellow . Give partial marks for partially correct answers.

1. Which one is true for an ideal decentralized solution for business management?
a. A centralized authority should decide the overall trust
b. Everyone should trust and cooperate with each other
c. No one should trust and cooperate with each other
d. No one should trust each other, however they should
cooperate

Hint: In a real-time scenario a decentralized system has multiple stakeholders and the
information submitted by them is not guaranteed to be correct. A collective agreement has to be
established.

2. Which of the statements below is/are true for successful run of decentralized
distributed systems?
a. Network of different players
b. Players must trust each other
c. If they cooperate, the society gets benefitted
d. None of the above

Hint: In a decentralized distributed system, a group of parties who may or may not know or
trust each other. But they should cooperate to reach a collective decision to benefit the system
as whole. So in a decentralized system trusting everyone is not always necessary to reach a
decision..

3. Where are the transactions logs recorded in a blockchain?


a. Centralized editable database
b. Editable log file
c. On centralized immutable database
d. On append only distributed immutable ledger
Hint: Refer to the slide of week1. An immutable append only ever growing chain of data is
used for blockchain. Data once added cannot be deleted or modified later.

4. What are the properties of cryptographic hash function?


a. It should be deterministic
b. It should be collision free
c. Ability to hide the input message
d. Puzzle friendly
Hint: Refer to the Week 1 slide. All the above properties are desirable for secure hashing.

5. For a 512 bit hash function, the attacker needs to compute how many hash
operations in order to find two matching outputs in the initial round?
a. 2512
b. 2128
c. 2256
d. 260

Hint: If a hash function produces N bits of output, an attacker needs to compute only 2N/2 hash
operations on a random input to find two matching outputs initially. The attacker can use the
output combination again to use in subsequent rounds.
6. Which of the following is a correct statement about a cryptographic hash function?
a. given the same message the hash function would not return the same hash
b. it is not very difficult to generate the original message from the hash
c. a small change in the message, impacts the hash value
d. one can easily find two different messages with same hash

Hint: Refer to the Week 1 slide for the properties of cryptographic hash functions.

7. What are the security features of a hash function?


a. Non-deterministic
b. Puzzle-friendly
c. Collision-resistance
d. Preimage resistance

Hint: Refer to the Week 1 slide for the properties of cryptographic hash functions.

8. SHA-512 hashing algorithm used by Bitcoin blockchain to determine the hash of a block.
This above statement is True or False.
a. True
b. False

Hint: SHA-256 is used in Bitcoin mining to construct the Bitcoin blockchain

9. For hash computation in SHA-512, what is the size of the block that the
message is divided into?
a. 1024
b. 512
c. 256
d. 1248

Hint: The message is divided into blocks of size 1024 bits, and the output produced is a 512-bit
message digest.

10. What is the message for hash value of


“8abe09bf65aefdb8e84bd8564efb765179cc01ee3f45809e47c8c9a02f72ff83” if SHA-256
is used? (case sensitive)
a. Consensus
b. Swayam
c. SWAYAM
d. Consensus

Hint: Verify the result https://emn178.github.io/online-tools/sha256.html

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy