Exam 10: Other Public-Key Cryptosystems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

the security of ElGamal is based on the difficulty of computing discrete logarithms.

Free
(True/False)
4.8/5
(29)
Correct Answer:
Verified

True

the addition operation in elliptic curve cryptography is the counterpart of modular multiplication in RSA, and multiple addition is the counterpart of __________ .

Free
(Short Answer)
4.7/5
(25)
Correct Answer:
Verified

modular exponentiation

the __________ key exchange involves multiplying pairs of nonzero integers modulo a prime number q.Keys are generated by exponentiation over the group with exponentiation defined as repeated multiplication.

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

A

two families of elliptic curves are used in cryptographic applications: prime curves over Zp and __________ over GF(2m).

(Short Answer)
4.8/5
(41)

____________ makes use of elliptic curves in which the variables and coefficients are all restricted to elements of a finite field.

(Multiple Choice)
4.8/5
(29)

there is not a computational advantage to using ECC with a shorter key length than a comparably secure tS A.

(True/False)
4.8/5
(35)

If a secret key is to be used as a _________ for conventional encryption a single number must be generated.

(Multiple Choice)
4.8/5
(37)

__________ can be used to develop a variety of elliptic curve cryptography schemes.

(Multiple Choice)
4.8/5
(30)

A __________ GF(2m) consists of 2m elements together with addition and multiplication operations that can be defined over polynomials.

(Short Answer)
4.8/5
(34)

For cryptography the variables and coefficients are restricted to elements in a __________ field.

(Multiple Choice)
4.9/5
(27)

For purposes of ECC, elliptic curve arithmetic involves the use of an elliptic curve equation defined over an infinite field.

(True/False)
5.0/5
(31)

the key exchange protocol vulnerability can be overcome with the use of digital signatures and __________ certificates.

(Short Answer)
4.8/5
(25)

Eq(a,b) is an elliptic curve with parameters a, b, and q, where _________ is a prime or an integer of the form 2m.

(Short Answer)
4.7/5
(34)

A(n) __________ is defined by an equation in two variables with coefficients.

(Multiple Choice)
4.8/5
(30)

the fastest known technique for taking the elliptic curve logarithm is known as the _________ method.

(Short Answer)
4.9/5
(33)

the ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.

(Multiple Choice)
5.0/5
(26)

the Diffie-Hellman key exchange formula for calculation of a secret key by User A is:

(Multiple Choice)
4.7/5
(27)

If three points on an elliptic curve lie on a straight line their sum is __________ .

(Multiple Choice)
4.9/5
(40)

ECC is fundamentally easier to explain than either RSA or Diffie-Hellman.

(True/False)
4.8/5
(28)

Elliptic curves are ellipses.

(True/False)
4.9/5
(36)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)