Exam 14: Lightweight Cryptography and Post-Quantum Cryptography
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
A(n) ___________ allows data that is being read or tansmitted to be checked for errors and, when necessary, corrected.
(Multiple Choice)
4.9/5
(32)
the most widely studied __________ is the NtRU family of cryptographic algorithms.
(Multiple Choice)
4.8/5
(34)
Cryptosystems that employ symmetric ciphers or hash functions
cannot be made quantum safe.
(True/False)
4.8/5
(39)
RFID devices require cryptographic algorithms that use a
large amount of logic and memory.
(True/False)
4.9/5
(35)
Post-quantum cryptography is concerned with the security of
asymmetric cryptographic algorithms.
(True/False)
4.7/5
(36)
A __________ is a single chip that contains the processor, nonvolatile memory for the program, volatile memory for input and output, a clock, and an I/O control unit.
(Short Answer)
4.8/5
(39)
the __________ of a cryptographic key is the time span during which a specific
cryptogrphic key is authorized for use for its defined purpose.
(Short Answer)
4.9/5
(32)
An example of a lightweight cryptographic block cipher is the
Scalable Encryption Algorithm.
(True/False)
4.9/5
(41)
Information in a quantum computer is represented as __________ .
(Multiple Choice)
4.8/5
(28)
__________ cryptography is concerned with the development of cryptographic algorithms that are secure against the potential development of quantum computers.
(Short Answer)
4.9/5
(33)
For both block and stream ciphers, the implementation to meet design goals makes use of one of three major hardware architecture options: parallel (loop unrolled), round-wise (rolled), and __________ .
(Short Answer)
4.8/5
(30)
__________ systems are dedicated, single-purpose devices that detect something in the environment, perform a basic level of processing, and then do something with the results.
(Short Answer)
4.8/5
(25)
__________ is a data collection technology that uses electronic tags attached to items to allow the items to be identified and tracked by a remote system.
(Multiple Choice)
4.8/5
(38)
A(n) __________ is a device with limited volatile and nonvolatile memory, limited processing power, and a low data rate transceiver.
(Multiple Choice)
4.9/5
(35)
__________ proposed a technique that builds on the Lamport scheme, using the concept of a hash tree.
(Multiple Choice)
4.8/5
(40)
ISO 29192 defines a minimum security strength for lightweight cryptography of __________ bits.
(Multiple Choice)
4.7/5
(31)
the _________ is designed to be stored on a RFID tag and it provides a universal identifier for every physical object anywhere in the world.
(Multiple Choice)
4.7/5
(33)
An example of a lightweight cryptographic hash function is __________ .
(Multiple Choice)
4.8/5
(42)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)