Exam 14: Lightweight Cryptography and Post-Quantum Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ___________ allows data that is being read or tansmitted to be checked for errors and, when necessary, corrected.

(Multiple Choice)
4.9/5
(32)

the Iot depends heavily on deeply embedded systems.

(True/False)
4.9/5
(36)

the most widely studied __________ is the NtRU family of cryptographic algorithms.

(Multiple Choice)
4.8/5
(34)

Cryptosystems that employ symmetric ciphers or hash functions cannot be made quantum safe.

(True/False)
4.8/5
(39)

RFID devices require cryptographic algorithms that use a large amount of logic and memory.

(True/False)
4.9/5
(35)

Microcontrollers are heavily utilized in automation processes.

(True/False)
4.8/5
(39)

Post-quantum cryptography is concerned with the security of asymmetric cryptographic algorithms.

(True/False)
4.7/5
(36)

A __________ is a single chip that contains the processor, nonvolatile memory for the program, volatile memory for input and output, a clock, and an I/O control unit.

(Short Answer)
4.8/5
(39)

the __________ of a cryptographic key is the time span during which a specific cryptogrphic key is authorized for use for its defined purpose.

(Short Answer)
4.9/5
(32)

An example of a lightweight cryptographic block cipher is the Scalable Encryption Algorithm.

(True/False)
4.9/5
(41)

Information in a quantum computer is represented as __________ .

(Multiple Choice)
4.8/5
(28)

__________ cryptography is concerned with the development of cryptographic algorithms that are secure against the potential development of quantum computers.

(Short Answer)
4.9/5
(33)

For both block and stream ciphers, the implementation to meet design goals makes use of one of three major hardware architecture options: parallel (loop unrolled), round-wise (rolled), and __________ .

(Short Answer)
4.8/5
(30)

__________ systems are dedicated, single-purpose devices that detect something in the environment, perform a basic level of processing, and then do something with the results.

(Short Answer)
4.8/5
(25)

__________ is a data collection technology that uses electronic tags attached to items to allow the items to be identified and tracked by a remote system.

(Multiple Choice)
4.8/5
(38)

A(n) __________ is a device with limited volatile and nonvolatile memory, limited processing power, and a low data rate transceiver.

(Multiple Choice)
4.9/5
(35)

__________ proposed a technique that builds on the Lamport scheme, using the concept of a hash tree.

(Multiple Choice)
4.8/5
(40)

ISO 29192 defines a minimum security strength for lightweight cryptography of __________ bits.

(Multiple Choice)
4.7/5
(31)

the _________ is designed to be stored on a RFID tag and it provides a universal identifier for every physical object anywhere in the world.

(Multiple Choice)
4.7/5
(33)

An example of a lightweight cryptographic hash function is __________ .

(Multiple Choice)
4.8/5
(42)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)