Exam 8: More Number Theory
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
For any integer b and a primitive root a of prime number p we can find a unique exponent i .This exponent i is referred to as the ___________ .
(Multiple Choice)
4.7/5
(27)
Discrete logarithms are analogous to ordinary logarithms but are defined using __________ arithmetic.
(Essay)
4.9/5
(28)
The procedure TEST takes a candidate integer n as input and returns the result __________ if n is definitely not a prime.
(Multiple Choice)
4.8/5
(26)
The number of positive integers less than n and relatively prime to n is referred to as __________ function.
(Essay)
4.8/5
(29)
Discrete logarithms are fundamental to a number of public-key algorithms including __________ key exchange and the DSA.
(Multiple Choice)
5.0/5
(29)
Two numbers are relatively prime if they have _________ prime factors in common.
(Multiple Choice)
4.8/5
(30)
Two theorems that play important roles in public-key cryptography are Fermat's theorem and __________ theorem.
(Essay)
4.9/5
(36)
A _________ number can only be divided by +/- values of itself and 1 and cannot have a remainder.
(Multiple Choice)
4.9/5
(43)
Although it does not appear to be as efficient as the Miller-Rabin algorithm,in 2002 a relatively simple deterministic algorithm that efficiently determines whether a given large number is a prime was developed.This algorithm is known as the _________ algorithm.
(Essay)
4.8/5
(31)
An important requirement in a number of cryptographic algorithms is the ability to choose a large prime number.
(True/False)
5.0/5
(32)
Two numbers are relatively prime if they have ________ prime factors in common.
(Multiple Choice)
4.8/5
(41)
Discrete logarithms are analogous to ordinary logarithms but are defined using modular arithmetic.
(True/False)
4.8/5
(33)
The __________ theorem states that it is possible to reconstruct integers in a certain range from their residues modulo a set of pairwise relatively prime moduli.
(Essay)
4.8/5
(31)
If a number is the highest possible exponent to which a number can belong,it is referred to as a _________ of n.
(Multiple Choice)
4.8/5
(28)
__________ theorem states the following: If p is prime and a is a positive integer not divisible by p,then ap-1 = 1mod p).
(Essay)
4.9/5
(38)
An important quantity in number theory referred to as __________ ,is defined as the number of positive integers less than n and relatively prime to n.
(Multiple Choice)
4.9/5
(34)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)