Exam 14: Lightweight Cryptography and Post-Quantum Cryptography
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
__________ cryptography is a subfield of cryptography concerned with the development of cryptographic algorithms for resource-constrained devices.
Free
(Short Answer)
4.7/5
(35)
Correct Answer:
Lightweight
Digital signatures is one of the categories of asymmetric
algorithms that are vulnerable to quantum computing.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
For any given algorithm, the longer the key and the more rounds,
the greater the security.
Free
(True/False)
4.7/5
(19)
Correct Answer:
True
the term __________ refers to the characteristic that a cryptographic algorithm makes minimal resource demands on the host system.
(Multiple Choice)
4.8/5
(34)
A (n)__________ uses a microcontroller, is not programmable once the program logic for the device has been burned into ROM, and has no interaction with a user.
(Multiple Choice)
4.9/5
(38)
the term __________ refers to a polynomial in more than one variable.
(Short Answer)
4.9/5
(24)
traditional hash functions may not meet the requirements for
implementation on constrained devices.
(True/False)
4.7/5
(31)
__________ searches an unordered list in O(n) time, while conventional algorithms require O(n).
(Multiple Choice)
4.9/5
(38)
Chip area is of concern when a cryptographic algorithm is
implemented in hardware.
(True/False)
4.8/5
(40)
A __________ consists of a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.
(Short Answer)
4.8/5
(41)
An enterprise should have policies for the maximum cryptoperiod
of each key type.
(True/False)
4.9/5
(43)
A(n) __________ can be defined as any device that includes a computer chip, but that is not a general-purpose workstation, desktop, or laptop computer.
(Multiple Choice)
4.9/5
(36)
Constrained devices are not particularly vulnerable to side-channel
attacks because they are physically secure.
(True/False)
4.8/5
(42)
__________ refers to the use of electroinics and software within a product that has a specific function or set of functions.
(Short Answer)
4.8/5
(32)
A __________ is an attack enabled by a leakage of information from a physical cryptosystem.
(Short Answer)
4.8/5
(30)
Public-key cryptography supports three critical cryptographic functionalities: public-key encryption, digital signatures, and __________ .
(Short Answer)
4.9/5
(33)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)