Exam 10: Other Public-Key Cryptosystems

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

To form a cryptographic system using __________ we need to find a "hard-problem" corresponding to factoring the product of two primes or taking the discrete logarithm.

(Essay)
4.9/5
(41)

The key exchange protocol vulnerability can be overcome with the use of digital signatures and __________ certificates.

(Essay)
4.8/5
(39)

An)___________ G is a set of elements with a binary operation,denoted by *,that associates to each ordered pair a,b)of elements in G an element a*b)in G.

(Essay)
4.8/5
(33)

There is not a computational advantage to using ECC with a shorter key length than a comparably secure TSA.

(True/False)
4.7/5
(39)

An encryption/decryption system requires a point G and an elliptic group _________ as parameters.

(Multiple Choice)
4.8/5
(26)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)