Exam 10: Other Public-Key Cryptosystems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

to form a cryptographic system using __________ we need to find a "hard-problem" corresponding to factoring the product of two primes or taking the discrete logarithm.

(Short Answer)
4.8/5
(29)

A considerably larger key size can be used for ECC compared to RS A.

(True/False)
4.9/5
(33)

the principal attraction of __________, compared to RSA, is that it appears to offer equal security for a far smaller key size, thereby reducing processing overhead.

(Short Answer)
4.8/5
(33)

An encryption/decryption system requires that point Pm be encrypted as a plaintext.

(True/False)
4.9/5
(38)

We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 and in which calculations are performed modulo p for a __________ over Zp.

(Short Answer)
4.8/5
(37)

Asymmetric algorithms are typically much slower than symmetric algorithms so they are not used to generate open-ended __________ generator bit streams.

(Short Answer)
4.9/5
(30)

A number of public-key ciphers are based on the use of an abelian group.

(True/False)
4.9/5
(37)

the __________ pseudorandom number generator is recommended in the ANSI standard X9.82 (Random Number Generation) and in the ISO standard 18031 (Random Bit Generation).

(Short Answer)
4.8/5
(31)

For determining the security of various elliptic curve ciphers it is of some interest to know the number of points in a finite abelian group defined over an elliptic curve.

(True/False)
4.9/5
(43)

the key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.

(Multiple Choice)
4.8/5
(40)

the __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.

(Multiple Choice)
4.9/5
(40)

Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography schemes, including key exchange, encryption, and ___________ .

(Short Answer)
4.9/5
(30)

An encryption/decryption system requires a point G and an elliptic group _________ as parameters.

(Multiple Choice)
4.8/5
(35)

the security of ECC depends on how difficult it is to determine k given kP and P.

(True/False)
4.8/5
(26)

__________ are best for software applications.

(Multiple Choice)
4.9/5
(33)

the Diffie-Hellman algorithm depends on the difficulty of computing discrete logarithms for its effectiveness.

(True/False)
4.9/5
(30)

Since a symmetric block cipher produces an apparently random output it can serve as the basis of a pseudorandom number generator.

(True/False)
4.8/5
(31)

For a ___________ defined over GF(2m), the variables and coefficients all take on values in GF(2m) and in calculations are performed over GF(2m).

(Multiple Choice)
4.9/5
(31)

A(n) ___________ G is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in G an element ( a*b) in G.

(Short Answer)
4.9/5
(36)

Included in the definition of an elliptic curve is a single element denoted O and called the point at infinity or the __________ .

(Multiple Choice)
4.7/5
(35)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)