Exam 14: Lightweight Cryptography and Post-Quantum Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ cryptography is a subfield of cryptography concerned with the development of cryptographic algorithms for resource-constrained devices.

Free
(Short Answer)
4.7/5
(35)
Correct Answer:
Verified

Lightweight

Digital signatures is one of the categories of asymmetric algorithms that are vulnerable to quantum computing.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

For any given algorithm, the longer the key and the more rounds, the greater the security.

Free
(True/False)
4.7/5
(19)
Correct Answer:
Verified

True

the term __________ refers to the characteristic that a cryptographic algorithm makes minimal resource demands on the host system.

(Multiple Choice)
4.8/5
(34)

A microprocessor is also called a "computer on a chip".

(True/False)
4.9/5
(33)

A (n)__________ uses a microcontroller, is not programmable once the program logic for the device has been burned into ROM, and has no interaction with a user.

(Multiple Choice)
4.9/5
(38)

the term __________ refers to a polynomial in more than one variable.

(Short Answer)
4.9/5
(24)

traditional hash functions may not meet the requirements for implementation on constrained devices.

(True/False)
4.7/5
(31)

__________ searches an unordered list in O(n) time, while conventional algorithms require O(n).

(Multiple Choice)
4.9/5
(38)

the term __________ refers to a polynomial of degree 2.

(Short Answer)
4.8/5
(33)

Chip area is of concern when a cryptographic algorithm is implemented in hardware.

(True/False)
4.8/5
(40)

A __________ consists of a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.

(Short Answer)
4.8/5
(41)

An enterprise should have policies for the maximum cryptoperiod of each key type.

(True/False)
4.9/5
(43)

the main elements of a RFID system are tags and __________ .

(Short Answer)
4.8/5
(34)

A(n) __________ can be defined as any device that includes a computer chip, but that is not a general-purpose workstation, desktop, or laptop computer.

(Multiple Choice)
4.9/5
(36)

Constrained devices are not particularly vulnerable to side-channel attacks because they are physically secure.

(True/False)
4.8/5
(42)

__________ refers to the use of electroinics and software within a product that has a specific function or set of functions.

(Short Answer)
4.8/5
(32)

A __________ is an attack enabled by a leakage of information from a physical cryptosystem.

(Short Answer)
4.8/5
(30)

there are very few types of devices with embedded systems.

(True/False)
4.8/5
(35)

Public-key cryptography supports three critical cryptographic functionalities: public-key encryption, digital signatures, and __________ .

(Short Answer)
4.9/5
(33)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)