Unit 3 - Practice Quiz

CSC203

1 In the context of distributed systems, what is the primary property that distinguishes Atomic Broadcast from Reliable Broadcast?

A. Validity
B. Total Order
C. Integrity
D. Confidentiality

2 Which of the following problems is theoretically equivalent to Atomic Broadcast in an asynchronous system with crash failures?

A. Leader Election
B. Consensus
C. Clock Synchronization
D. Distributed Hash Table

3 In the State Machine Replication (SMR) approach used in blockchains, what role does Atomic Broadcast play?

A. It encrypts the state transitions.
B. It generates the Proof-of-Work puzzle.
C. It ensures all replicas execute the same transactions in the same sequence.
D. It allows nodes to join the network without permission.

4 Ideally, an atomic broadcast protocol satisfies Validity, Agreement, Integrity, and Total Order. What does the Integrity property guarantee?

A. Every correct node eventually delivers the message.
B. If a correct node delivers a message , then was broadcast by some node.
C. All nodes agree on the timestamp of the message.
D. No two messages have the same hash.

5 In a distributed system, if the 'Liveness' property of Atomic Broadcast is violated, what is the result?

A. Messages are delivered in the wrong order.
B. Messages are corrupted.
C. Messages are never delivered.
D. Malicious nodes can forge signatures.

6 What is the FLP Impossibility Result regarding consensus?

A. Consensus is impossible in a synchronous system with Byzantine faults.
B. Consensus is impossible in an asynchronous system with even one faulty process.
C. It is impossible to achieve consensus without Public Key Cryptography.
D. It is impossible to scale consensus beyond 100 nodes.

7 In the context of Consensus, what is Safety?

A. All non-faulty nodes eventually decide on a value.
B. The protocol tolerates network delays.
C. Nothing 'bad' happens (e.g., two correct nodes never decide on different values).
D. The system recovers automatically from a shutdown.

8 What is a Byzantine fault?

A. A node crashes and stops responding.
B. A node responds slowly due to network latency.
C. A node behaves arbitrarily, potentially sending conflicting or malicious messages.
D. A node loses its private key.

9 To tolerate Byzantine faults in a partially synchronous network without using digital signatures (standard PBFT model), what is the minimum total number of nodes required?

A.
B.
C.
D.

10 Which of the following is NOT a property required for a standard consensus protocol?

A. Termination
B. Agreement
C. Validity
D. Confidentiality

11 In the 'Byzantine Generals Problem', if the General (Commander) is traitorous, what must the loyal lieutenants achieve?

A. They must identify the traitor immediately.
B. They must all agree on the same plan of action.
C. They must retreat.
D. They must elect a new General.

12 How does the Dolev-Strong protocol improve Byzantine Agreement limits compared to standard message-passing models?

A. It assumes a synchronous network.
B. It uses digital signatures (authenticated broadcast).
C. It assumes zero network latency.
D. It requires a trusted hardware module.

13 In a BFT system, a Quorum usually refers to:

A. The minimum number of votes required to make progress or commit a state.
B. The total number of faulty nodes.
C. The set of transactions in a block.
D. The cryptographic difficulty target.

14 Which failure model is the weakest (easiest to handle)?

A. Byzantine Failures
B. Crash (Fail-Stop) Failures
C. Rational/Selfish Failures
D. Arbitrary Failures

15 What happens if the number of Byzantine nodes exceeds the safety threshold of a BFT protocol?

A. The network speed slows down slightly.
B. The ledger may Fork (Double Spending becomes possible).
C. The cryptography breaks.
D. Nodes automatically turn off.

16 A cryptographic hash function maps an input of arbitrary size to:

A. An output of arbitrary size.
B. An output of fixed size.
C. An encrypted private key.
D. A verifiable random proof.

17 What is Pre-image Resistance?

A. Given , it is hard to find .
B. Given , it is computationally infeasible to find any such that .
C. Given , it is hard to find such that .
D. It is hard to find any pair such that .

18 The Avalanche Effect in hash functions implies that:

A. A small change in input results in a significant, unpredictable change in the output.
B. The hash calculation gets faster as the input grows.
C. Collisions cascade through the network.
D. The output size increases with input size.

19 Which mathematical principle guarantees that hash collisions MUST exist?

A. The Pigeonhole Principle
B. The Riemann Hypothesis
C. The Heisenberg Uncertainty Principle
D. Fermat's Last Theorem

20 What is Second Pre-image Resistance?

A. Given , it is infeasible to find a different such that .
B. Given , it is infeasible to find such that .
C. It is infeasible to find any two inputs that collide.
D. The hash function relies on two keys.

21 If a hash function has an output size of bits, what is the approximate complexity to find a collision using the Birthday Attack?

A.
B.
C.
D.

22 Which property is the strongest requirement for a cryptographic hash function?

A. Pre-image resistance
B. Second pre-image resistance
C. Collision resistance
D. Puzzle friendliness

23 In the context of blockchain, why must a hash function be Collision Resistant?

A. To ensure mining is profitable.
B. To prevent an attacker from creating a fraudulent transaction that produces the same hash as a valid one.
C. To encrypt transaction details.
D. To reduce the block size.

24 What is the primary characteristic of a Puzzle Friendly hash function?

A. It is easy to find the input given the output.
B. The output contains only zeros.
C. Given an input and a target set , it is difficult to find a nonce such that .
D. It can process inputs faster than standard hash functions.

25 In Bitcoin's Proof of Work, the property that prevents miners from predicting which nonce will result in a valid block hash is:

A. Homomorphism
B. Puzzle Friendliness
C. malleability
D. Public Key Infrastructure

26 Mathematically, for a hash to be puzzle friendly, if is chosen from a distribution with high min-entropy, then finding such that should require:

A. operations.
B. Checking approximately possible values (searching the space).
C. Solving a linear equation.
D. Knowledge of the private key.

27 Which of the following is an example of a Puzzle Friendly hash function construction used in Bitcoin?

A. SHA-256
B. CRC32
C. MD5
D. AES-CBC

28 A digital signature scheme consists of three algorithms. Which of the following is NOT one of them?

A. KeyGen (Key Generation)
B. Sign (Signing)
C. Verify (Verification)
D. Encrypt (Encryption)

29 What is the property of Non-repudiation in digital signatures?

A. The signer cannot later deny having signed the message.
B. The message cannot be read by unauthorized parties.
C. The signature changes if the message changes.
D. The signature can be verified by anyone.

30 In blockchain transactions, what specifically is being signed by the sender's private key?

A. The receiver's private key.
B. The entire blockchain history.
C. The hash of the transaction data.
D. The current timestamp.

31 Which signature scheme is currently used in Bitcoin and Ethereum (Secp256k1 curve)?

A. RSA
B. ECDSA (Elliptic Curve Digital Signature Algorithm)
C. ElGamal
D. BLS Signatures

32 What is Existential Forgery?

A. An attacker creates a signature for a message that was already signed.
B. An attacker is able to produce a valid signature for at least one message without the private key.
C. An attacker recovers the private key from the public key.
D. An attacker deletes the signature from the blockchain.

33 The security standard required for digital signatures in blockchain is usually:

A. EU-CMA (Existential Unforgeability under Chosen Message Attack)
B. IND-CPA (Indistinguishability under Chosen Plaintext Attack)
C. Perfect Secrecy
D. Weak Collision Resistance

34 What is a benefit of Schnorr Signatures (used in Bitcoin's Taproot upgrade) over ECDSA?

A. They are quantum resistant.
B. They support Key Aggregation and Linearity.
C. They do not require a private key.
D. They use larger keys for better security.

35 In a digital signature, the Verification algorithm takes which inputs?

A. Message, Signature, Private Key
B. Message, Signature, Public Key
C. Signature, Private Key, Public Key
D. Message, Hash, Private Key

36 Which RFC standard defines Deterministic ECDSA to prevent random number generator failures from leaking private keys?

A. RFC 6979
B. RFC 791
C. RFC 2616
D. RFC 5246

37 What is a Verifiable Random Function (VRF)?

A. A function that generates random numbers that cannot be verified.
B. A public-key primitive that produces a random output and a proof that the output was generated correctly.
C. A hash function that changes every time it is called.
D. A random number generator used for private keys.

38 In a VRF, what defines the property of Uniqueness?

A. For any input and key, there is exactly one valid output.
B. The output is unique across all users.
C. The private key is unique.
D. The proof is unique even if the output is not.

39 Which of the following is a common use case for VRFs in blockchain (e.g., Algorand, Cardano)?

A. Encrypting wallet balances.
B. Cryptographic sortition (selecting block proposers/committees randomly but securely).
C. Compressing the blockchain size.
D. Generating user passwords.

40 The output of a VRF function consists of:

A. A Random Value and the Secret Key.
B. A Random Value and a Proof.
C. Just a Random Value.
D. Just a Proof.

41 How does a VRF differ from a standard Digital Signature?

A. Signatures are for authentication; VRFs are for encryption.
B. Signatures are not unique (different nonces yield different signatures); VRF outputs are unique for an input.
C. VRFs do not use keys.
D. Digital signatures are slower.

42 What is Pseudo-randomness in the context of VRF?

A. The output is truly random and based on atmospheric noise.
B. The output is indistinguishable from uniform random to anyone not holding the proof/key.
C. The output follows a normal distribution.
D. The output is always an even number.

43 In a Zero-Knowledge Proof (ZKP), what is the property of Zero-Knowledge?

A. The verifier learns nothing about the secret statement other than the fact that it is true.
B. The prover knows zero information about the verifier.
C. The proof requires zero computation.
D. The system has zero latency.

44 Which are the three fundamental properties of a Zero-Knowledge Proof?

A. Completeness, Soundness, Zero-Knowledge
B. Confidentiality, Integrity, Availability
C. Speed, Scalability, Security
D. Encryption, Decryption, Hashing

45 In the 'Ali Baba's Cave' analogy for ZKP, knowing the secret allows Peggy (the prover) to:

A. Open the magic door connecting paths A and B.
B. Unlock the cave entrance.
C. Teleport outside.
D. Guess which path Victor will choose.

46 What does zk-SNARK stand for?

A. Zero-Knowledge Simple Non-Interactive Argument of Knowledge
B. Zero-Knowledge Succinct Non-Interactive Argument of Knowledge
C. Zero-Key Secure Network Access Resilient Kernel
D. Zero-Knowledge Secure Node Authentication Response Key

47 What is a Trusted Setup in the context of some ZK systems (like early Zcash)?

A. Installing antivirus software on all nodes.
B. A preparatory phase to generate common reference string (CRS) parameters, where 'toxic waste' (secrets) must be destroyed.
C. Trusting the government to run the blockchain.
D. Hardcoding the Genesis block.

48 How are Non-Interactive Zero-Knowledge (NIZK) proofs typically constructed from interactive ones?

A. Using the Fiat-Shamir Heuristic.
B. By increasing the key size.
C. By removing the verifier entirely.
D. By using symmetric encryption.

49 Which blockchain privacy feature relies heavily on Zero-Knowledge proofs?

A. Confidential Transactions (e.g., in Monero or Zcash)
B. Block reward halving
C. Difficulty adjustment
D. Peer discovery