Deck 10: Other Public-Key Cryptosystems

Full screen (f)
exit full mode
Question
the key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.

A)one-way function
B)time complexity
C)chosen ciphertext
D)man-in-the-middle
Use Space or
up arrow
down arrow
to flip the card.
Question
the __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.

A)Rabin
B)Rijnedel
C)Hillman
D)ElGamal
Question
For determining the security of various elliptic curve
ciphers it is of some interest to know the number of
points in a finite abelian group defined over an elliptic
curve.
Question
the Diffie-Hellman key exchange is a simple public-key
algorithm.
Question
the security of ElGamal is based on the difficulty of
computing discrete logarithms.
Question
A considerably larger key size can be used for ECC
compared to RS
A.
Question
ECC is fundamentally easier to explain than either RSA or
Diffie-Hellman.
Question
For purposes of ECC, elliptic curve arithmetic involves
the use of an elliptic curve equation defined over an
infinite field.
Question
the ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.

A)Micali-Schnorr
B)Elgamal-Fraiser
C)Diffie-Hellman
D)Miller-Rabin
Question
there is not a computational advantage to using ECC
with a shorter key length than a comparably secure tS
A.
Question
Most of the products and standards that use public-key
cryptography for encryption and digital signatures use RS
A.
Question
the Diffie-Hellman algorithm depends on the difficulty of
computing discrete logarithms for its effectiveness.
Question
An encryption/decryption system requires that point
Pm be encrypted as a plaintext.
Question
A number of public-key ciphers are based on the use of
an abelian group.
Question
the security of ECC depends on how difficult it is to
determine k given kP and P.
Question
A(n) __________ is defined by an equation in two variables with coefficients.

A)abelian group
B)binary curve
C)cubic equation
D)elliptic curve
Question
Elliptic curves are ellipses.
Question
__________ can be used to develop a variety of elliptic curve cryptography schemes.

A)Elliptic curve arithmetic
B)Binary curve
C)Prime curve
D)Cubic equation
Question
Since a symmetric block cipher produces an apparently
random output it can serve as the basis of a
pseudorandom number generator.
Question
the form of cubic equation appropriate for
cryptographic applications for elliptic curves is
somewhat different for GF(2m) than for Zp.
Question
Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography schemes, including key exchange, encryption, and ___________ .
Question
For a ___________ defined over GF(2m), the variables and coefficients all take on values in GF(2m) and in calculations are performed over GF(2m).

A)cubic equation
B)prime curve
C)binary curve
D)abelian group
Question
the purpose of the ___________ algorithm is to enable two users to securely exchange a key that can then be used for subsequent encryption of messages.
Question
If a secret key is to be used as a _________ for conventional encryption a single number must be generated.

A)discrete logarithm
B)prime curve
C)session key
D)primitive root
Question
Included in the definition of an elliptic curve is a single element denoted O and called the point at infinity or the __________ .

A)prime point
B)zero point
C)abelian point
D)elliptic point
Question
the Diffie-Hellman key exchange formula for calculation of a secret key by User A is:

A)K = nB x PA
B)K = nA x PB
C)K = nP x BA
D)K = nA x PA
Question
A __________ GF(2m) consists of 2m elements together with addition and multiplication operations that can be defined over polynomials.
Question
the principal attraction of __________, compared to RSA, is that it appears to offer equal security for a far smaller key size, thereby reducing processing overhead.
Question
the key exchange protocol vulnerability can be overcome with the use of digital signatures and __________ certificates.
Question
two families of elliptic curves are used in cryptographic applications: prime curves over Zp and __________ over GF(2m).
Question
We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 and in which calculations are performed modulo p for a __________ over Zp.
Question
For cryptography the variables and coefficients are restricted to elements in a __________ field.

A)primitive
B)infinite
C)public
D)finite
Question
the __________ key exchange involves multiplying pairs of nonzero integers modulo a prime number q.Keys are generated by exponentiation over the group with exponentiation defined as repeated multiplication.

A)Diffie-Hellman
B)Rabin-Miller
C)Micali-Schnorr
D)ElGamal
Question
A(n) ___________ G is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in G an element ( a*b) in G.
Question
If three points on an elliptic curve lie on a straight line their sum is __________ .

A)0
B)1
C)6
D)3
Question
to form a cryptographic system using __________ we need to
find a "hard-problem" corresponding to factoring the product of two primes or taking the discrete logarithm.
Question
____________ makes use of elliptic curves in which the variables and coefficients are all restricted to elements of a finite field.

A)Prime curve
B)Elliptic curve cryptography (ECC)
C)abelian group
D)Micali-Schnorr
Question
the addition operation in elliptic curve cryptography is the counterpart of modular multiplication in RSA, and multiple addition is the counterpart of __________ .
Question
An encryption/decryption system requires a point G and an elliptic group _________ as parameters.

A)Eb(a,q)
B)Ea(q,b)
C)En(a,b)
D)Eq(a,b)
Question
__________ are best for software applications.

A)Binary curves
B)Prime curves
C)Bit operations
D)Abelian groups
Question
Eq(a,b) is an elliptic curve with parameters a, b, and q, where
_________ is a prime or an integer of the form 2m.
Question
Asymmetric algorithms are typically much slower than
symmetric algorithms so they are not used to generate open-ended __________ generator bit streams.
Question
the __________ pseudorandom number generator is
recommended in the ANSI standard X9.82 (Random Number Generation) and in the ISO standard 18031 (Random Bit Generation).
Question
A __________ of a prime number p is one whose powers
modulo p generate all the integers from 1 to p-1.
Question
the fastest known technique for taking the elliptic curve
logarithm is known as the _________ method.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Other Public-Key Cryptosystems
1
the key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.

A)one-way function
B)time complexity
C)chosen ciphertext
D)man-in-the-middle
D
2
the __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.

A)Rabin
B)Rijnedel
C)Hillman
D)ElGamal
D
3
For determining the security of various elliptic curve
ciphers it is of some interest to know the number of
points in a finite abelian group defined over an elliptic
curve.
True
4
the Diffie-Hellman key exchange is a simple public-key
algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
the security of ElGamal is based on the difficulty of
computing discrete logarithms.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
A considerably larger key size can be used for ECC
compared to RS
A.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
ECC is fundamentally easier to explain than either RSA or
Diffie-Hellman.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
For purposes of ECC, elliptic curve arithmetic involves
the use of an elliptic curve equation defined over an
infinite field.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
the ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.

A)Micali-Schnorr
B)Elgamal-Fraiser
C)Diffie-Hellman
D)Miller-Rabin
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
there is not a computational advantage to using ECC
with a shorter key length than a comparably secure tS
A.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Most of the products and standards that use public-key
cryptography for encryption and digital signatures use RS
A.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
the Diffie-Hellman algorithm depends on the difficulty of
computing discrete logarithms for its effectiveness.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
An encryption/decryption system requires that point
Pm be encrypted as a plaintext.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
A number of public-key ciphers are based on the use of
an abelian group.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
the security of ECC depends on how difficult it is to
determine k given kP and P.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) __________ is defined by an equation in two variables with coefficients.

A)abelian group
B)binary curve
C)cubic equation
D)elliptic curve
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Elliptic curves are ellipses.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
__________ can be used to develop a variety of elliptic curve cryptography schemes.

A)Elliptic curve arithmetic
B)Binary curve
C)Prime curve
D)Cubic equation
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Since a symmetric block cipher produces an apparently
random output it can serve as the basis of a
pseudorandom number generator.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
the form of cubic equation appropriate for
cryptographic applications for elliptic curves is
somewhat different for GF(2m) than for Zp.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography schemes, including key exchange, encryption, and ___________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
For a ___________ defined over GF(2m), the variables and coefficients all take on values in GF(2m) and in calculations are performed over GF(2m).

A)cubic equation
B)prime curve
C)binary curve
D)abelian group
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
the purpose of the ___________ algorithm is to enable two users to securely exchange a key that can then be used for subsequent encryption of messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
If a secret key is to be used as a _________ for conventional encryption a single number must be generated.

A)discrete logarithm
B)prime curve
C)session key
D)primitive root
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
Included in the definition of an elliptic curve is a single element denoted O and called the point at infinity or the __________ .

A)prime point
B)zero point
C)abelian point
D)elliptic point
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
the Diffie-Hellman key exchange formula for calculation of a secret key by User A is:

A)K = nB x PA
B)K = nA x PB
C)K = nP x BA
D)K = nA x PA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
A __________ GF(2m) consists of 2m elements together with addition and multiplication operations that can be defined over polynomials.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
the principal attraction of __________, compared to RSA, is that it appears to offer equal security for a far smaller key size, thereby reducing processing overhead.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
the key exchange protocol vulnerability can be overcome with the use of digital signatures and __________ certificates.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
two families of elliptic curves are used in cryptographic applications: prime curves over Zp and __________ over GF(2m).
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 and in which calculations are performed modulo p for a __________ over Zp.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
For cryptography the variables and coefficients are restricted to elements in a __________ field.

A)primitive
B)infinite
C)public
D)finite
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
the __________ key exchange involves multiplying pairs of nonzero integers modulo a prime number q.Keys are generated by exponentiation over the group with exponentiation defined as repeated multiplication.

A)Diffie-Hellman
B)Rabin-Miller
C)Micali-Schnorr
D)ElGamal
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
A(n) ___________ G is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in G an element ( a*b) in G.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
If three points on an elliptic curve lie on a straight line their sum is __________ .

A)0
B)1
C)6
D)3
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
to form a cryptographic system using __________ we need to
find a "hard-problem" corresponding to factoring the product of two primes or taking the discrete logarithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
____________ makes use of elliptic curves in which the variables and coefficients are all restricted to elements of a finite field.

A)Prime curve
B)Elliptic curve cryptography (ECC)
C)abelian group
D)Micali-Schnorr
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
the addition operation in elliptic curve cryptography is the counterpart of modular multiplication in RSA, and multiple addition is the counterpart of __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
An encryption/decryption system requires a point G and an elliptic group _________ as parameters.

A)Eb(a,q)
B)Ea(q,b)
C)En(a,b)
D)Eq(a,b)
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
__________ are best for software applications.

A)Binary curves
B)Prime curves
C)Bit operations
D)Abelian groups
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
Eq(a,b) is an elliptic curve with parameters a, b, and q, where
_________ is a prime or an integer of the form 2m.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
Asymmetric algorithms are typically much slower than
symmetric algorithms so they are not used to generate open-ended __________ generator bit streams.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
the __________ pseudorandom number generator is
recommended in the ANSI standard X9.82 (Random Number Generation) and in the ISO standard 18031 (Random Bit Generation).
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
A __________ of a prime number p is one whose powers
modulo p generate all the integers from 1 to p-1.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
the fastest known technique for taking the elliptic curve
logarithm is known as the _________ method.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.