Exam 10: Other Public-Key Cryptosystems
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
to form a cryptographic system using __________ we need to
find a "hard-problem" corresponding to factoring the product of two primes or taking the discrete logarithm.
(Short Answer)
4.8/5
(29)
A considerably larger key size can be used for ECC
compared to RS
A.
(True/False)
4.9/5
(33)
the principal attraction of __________, compared to RSA, is that it appears to offer equal security for a far smaller key size, thereby reducing processing overhead.
(Short Answer)
4.8/5
(33)
An encryption/decryption system requires that point
Pm be encrypted as a plaintext.
(True/False)
4.9/5
(38)
We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 and in which calculations are performed modulo p for a __________ over Zp.
(Short Answer)
4.8/5
(37)
Asymmetric algorithms are typically much slower than
symmetric algorithms so they are not used to generate open-ended __________ generator bit streams.
(Short Answer)
4.9/5
(30)
A number of public-key ciphers are based on the use of
an abelian group.
(True/False)
4.9/5
(37)
the __________ pseudorandom number generator is
recommended in the ANSI standard X9.82 (Random Number Generation) and in the ISO standard 18031 (Random Bit Generation).
(Short Answer)
4.8/5
(31)
For determining the security of various elliptic curve
ciphers it is of some interest to know the number of
points in a finite abelian group defined over an elliptic
curve.
(True/False)
4.9/5
(43)
the key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.
(Multiple Choice)
4.8/5
(40)
the __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.
(Multiple Choice)
4.9/5
(40)
Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography schemes, including key exchange, encryption, and ___________ .
(Short Answer)
4.9/5
(30)
An encryption/decryption system requires a point G and an elliptic group _________ as parameters.
(Multiple Choice)
4.8/5
(35)
the security of ECC depends on how difficult it is to
determine k given kP and P.
(True/False)
4.8/5
(26)
the Diffie-Hellman algorithm depends on the difficulty of
computing discrete logarithms for its effectiveness.
(True/False)
4.9/5
(30)
Since a symmetric block cipher produces an apparently
random output it can serve as the basis of a
pseudorandom number generator.
(True/False)
4.8/5
(31)
For a ___________ defined over GF(2m), the variables and coefficients all take on values in GF(2m) and in calculations are performed over GF(2m).
(Multiple Choice)
4.9/5
(31)
A(n) ___________ G is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in G an element ( a*b) in G.
(Short Answer)
4.9/5
(36)
Included in the definition of an elliptic curve is a single element denoted O and called the point at infinity or the __________ .
(Multiple Choice)
4.7/5
(35)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)