Exam 10: Other Public-Key Cryptosystems
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
the security of ElGamal is based on the difficulty of
computing discrete logarithms.
Free
(True/False)
4.8/5
(29)
Correct Answer:
True
the addition operation in elliptic curve cryptography is the counterpart of modular multiplication in RSA, and multiple addition is the counterpart of __________ .
Free
(Short Answer)
4.7/5
(25)
Correct Answer:
modular exponentiation
the __________ key exchange involves multiplying pairs of nonzero integers modulo a prime number q.Keys are generated by exponentiation over the group with exponentiation defined as repeated multiplication.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
A
two families of elliptic curves are used in cryptographic applications: prime curves over Zp and __________ over GF(2m).
(Short Answer)
4.8/5
(41)
____________ makes use of elliptic curves in which the variables and coefficients are all restricted to elements of a finite field.
(Multiple Choice)
4.8/5
(29)
there is not a computational advantage to using ECC
with a shorter key length than a comparably secure tS
A.
(True/False)
4.8/5
(35)
If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
(Multiple Choice)
4.8/5
(37)
__________ can be used to develop a variety of elliptic curve cryptography schemes.
(Multiple Choice)
4.8/5
(30)
A __________ GF(2m) consists of 2m elements together with addition and multiplication operations that can be defined over polynomials.
(Short Answer)
4.8/5
(34)
For cryptography the variables and coefficients are restricted to elements in a __________ field.
(Multiple Choice)
4.9/5
(27)
For purposes of ECC, elliptic curve arithmetic involves
the use of an elliptic curve equation defined over an
infinite field.
(True/False)
5.0/5
(31)
the key exchange protocol vulnerability can be overcome with the use of digital signatures and __________ certificates.
(Short Answer)
4.8/5
(25)
Eq(a,b) is an elliptic curve with parameters a, b, and q, where
_________ is a prime or an integer of the form 2m.
(Short Answer)
4.7/5
(34)
A(n) __________ is defined by an equation in two variables with coefficients.
(Multiple Choice)
4.8/5
(30)
the fastest known technique for taking the elliptic curve
logarithm is known as the _________ method.
(Short Answer)
4.9/5
(33)
the ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.
(Multiple Choice)
5.0/5
(26)
the Diffie-Hellman key exchange formula for calculation of a secret key by User A is:
(Multiple Choice)
4.7/5
(27)
If three points on an elliptic curve lie on a straight line their sum is __________ .
(Multiple Choice)
4.9/5
(40)
ECC is fundamentally easier to explain than either RSA or
Diffie-Hellman.
(True/False)
4.8/5
(28)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)