Exam 10: Other Public-Key Cryptosystems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

the form of cubic equation appropriate for cryptographic applications for elliptic curves is somewhat different for GF(2m) than for Zp.

(True/False)
4.9/5
(38)

the purpose of the ___________ algorithm is to enable two users to securely exchange a key that can then be used for subsequent encryption of messages.

(Short Answer)
4.8/5
(37)

A __________ of a prime number p is one whose powers modulo p generate all the integers from 1 to p-1.

(Short Answer)
4.7/5
(21)

the Diffie-Hellman key exchange is a simple public-key algorithm.

(True/False)
4.8/5
(42)

Most of the products and standards that use public-key cryptography for encryption and digital signatures use RS A.

(True/False)
4.7/5
(32)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)