Deck 10: Other Public-Key Cryptosystems

Full screen (f)
exit full mode
Question
__________ can be used to develop a variety of elliptic curve cryptography schemes.

A)Elliptic curve arithmetic
B)Binary curve
C)Prime curve
D)Cubic equation
Use Space or
up arrow
down arrow
to flip the card.
Question
Most of the products and standards that use public-key cryptography for encryption and digital signatures use RSA.
Question
The security of ECC depends on how difficult it is to determine k given kP and P.
Question
The ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.

A)Micali-Schnorr
B)Elgamal-Fraiser
C)Diffie-Hellman
D)Miller-Rabin
Question
The __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.

A)Rabin
B)Rijnedel
C)Hillman
D)ElGamal
Question
There is not a computational advantage to using ECC with a shorter key length than a comparably secure TSA.
Question
Elliptic curves are ellipses.
Question
The form of cubic equation appropriate for cryptographic applications for elliptic curves is somewhat different for GF2m)than for Zp.
Question
Since a symmetric block cipher produces an apparently random output it can serve as the basis of a pseudorandom number generator.
Question
The Diffie-Hellman key exchange is a simple public-key algorithm.
Question
An)__________ is defined by an equation in two variables with coefficients.

A)abelian group
B)binary curve
C)cubic equation
D)elliptic curve
Question
The security of ElGamal is based on the difficulty of computing discrete logarithms.
Question
For determining the security of various elliptic curve ciphers it is of some interest to know the number of points in a finite abelian group defined over an elliptic curve.
Question
The Diffie-Hellman algorithm depends on the difficulty of computing discrete logarithms for its effectiveness.
Question
A number of public-key ciphers are based on the use of an abelian group.
Question
For purposes of ECC,elliptic curve arithmetic involves the use of an elliptic curve equation defined over an infinite field.
Question
An encryption/decryption system requires that point Pm be encrypted as a plaintext.
Question
ECC is fundamentally easier to explain than either RSA or Diffie-Hellman.
Question
A considerably larger key size can be used for ECC compared to RSA.
Question
The key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.

A)one-way function
B)time complexity
C)chosen ciphertext
D)man-in-the-middle
Question
The purpose of the ___________ algorithm is to enable two users to securely exchange a key that can then be used for subsequent encryption of messages.
Question
If a secret key is to be used as a _________ for conventional encryption a single number must be generated.

A)discrete logarithm
B)prime curve
C)session key
D)primitive root
Question
A __________ GF2m)consists of 2m elements together with addition and multiplication operations that can be defined over polynomials.
Question
If three points on an elliptic curve lie on a straight line their sum is __________ .

A)0
B)1
C)6
D)3
Question
We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 and in which calculations are performed modulo p for a __________ over Zp.
Question
____________ makes use of elliptic curves in which the variables and coefficients are all restricted to elements of a finite field.

A)Prime curve
B)Elliptic curve cryptographyECC)
C)abelian group
D)Micali-Schnorr
Question
Two families of elliptic curves are used in cryptographic applications: prime curves over Zp and __________ over GF2m).
Question
The principal attraction of __________,compared to RSA,is that it appears to offer equal security for a far smaller key size,thereby reducing processing overhead.
Question
The Diffie-Hellman key exchange formula for calculation of a secret key by User A is:

A)K = nB x PA
B)K = nA x PB
C)K = nP x BA
D)K = nA x PA
Question
To form a cryptographic system using __________ we need to find a "hard-problem" corresponding to factoring the product of two primes or taking the discrete logarithm.
Question
The addition operation in elliptic curve cryptography is the counterpart of modular multiplication in RSA,and multiple addition is the counterpart of __________ .
Question
The __________ key exchange involves multiplying pairs of nonzero integers modulo a prime number q.Keys are generated by exponentiation over the group with exponentiation defined as repeated multiplication.

A)Diffie-Hellman
B)Rabin-Miller
C)Micali-Schnorr
D)ElGamal
Question
For a ___________ defined over GF2m),the variables and coefficients all take on values in GF2m)and in calculations are performed over GF2m).

A)cubic equation
B)prime curve
C)binary curve
D)abelian group
Question
An encryption/decryption system requires a point G and an elliptic group _________ as parameters.

A)Eba,q)
B)Eaq,b)
C)Ena,b)
D)Eqa,b)
Question
An)___________ G is a set of elements with a binary operation,denoted by *,that associates to each ordered pair a,b)of elements in G an element a*b)in
G.
Question
For cryptography the variables and coefficients are restricted to elements in a __________ field.

A)primitive
B)infinite
C)public
D)finite
Question
Included in the definition of an elliptic curve is a single element denoted O and called the point at infinity or the __________ .

A)prime point
B)zero point
C)abelian point
D)elliptic point
Question
__________ are best for software applications.

A)Binary curves
B)Prime curves
C)Bit operations
D)Abelian groups
Question
Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography schemes,including key exchange,encryption,and ___________ .
Question
The key exchange protocol vulnerability can be overcome with the use of digital signatures and __________ certificates.
Question
Eqa,b)is an elliptic curve with parameters a,b,and q,where _________ is a prime or an integer of the form 2m.
Question
The fastest known technique for taking the elliptic curve logarithm is known as the _________ method.
Question
The __________ pseudorandom number generator is recommended in the ANSI standard X9.82 Random Number Generation)and in the ISO standard 18031 Random Bit Generation).
Question
Asymmetric algorithms are typically much slower than symmetric algorithms so they are not used to generate open-ended __________ generator bit streams.
Question
The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cryptographic algorithm or system.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Other Public-Key Cryptosystems
1
__________ can be used to develop a variety of elliptic curve cryptography schemes.

A)Elliptic curve arithmetic
B)Binary curve
C)Prime curve
D)Cubic equation
A
2
Most of the products and standards that use public-key cryptography for encryption and digital signatures use RSA.
True
3
The security of ECC depends on how difficult it is to determine k given kP and P.
True
4
The ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.

A)Micali-Schnorr
B)Elgamal-Fraiser
C)Diffie-Hellman
D)Miller-Rabin
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
The __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.

A)Rabin
B)Rijnedel
C)Hillman
D)ElGamal
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
There is not a computational advantage to using ECC with a shorter key length than a comparably secure TSA.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Elliptic curves are ellipses.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The form of cubic equation appropriate for cryptographic applications for elliptic curves is somewhat different for GF2m)than for Zp.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Since a symmetric block cipher produces an apparently random output it can serve as the basis of a pseudorandom number generator.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The Diffie-Hellman key exchange is a simple public-key algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
An)__________ is defined by an equation in two variables with coefficients.

A)abelian group
B)binary curve
C)cubic equation
D)elliptic curve
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The security of ElGamal is based on the difficulty of computing discrete logarithms.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
For determining the security of various elliptic curve ciphers it is of some interest to know the number of points in a finite abelian group defined over an elliptic curve.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
The Diffie-Hellman algorithm depends on the difficulty of computing discrete logarithms for its effectiveness.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
A number of public-key ciphers are based on the use of an abelian group.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
For purposes of ECC,elliptic curve arithmetic involves the use of an elliptic curve equation defined over an infinite field.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
An encryption/decryption system requires that point Pm be encrypted as a plaintext.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
ECC is fundamentally easier to explain than either RSA or Diffie-Hellman.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
A considerably larger key size can be used for ECC compared to RSA.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.

A)one-way function
B)time complexity
C)chosen ciphertext
D)man-in-the-middle
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
The purpose of the ___________ algorithm is to enable two users to securely exchange a key that can then be used for subsequent encryption of messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
If a secret key is to be used as a _________ for conventional encryption a single number must be generated.

A)discrete logarithm
B)prime curve
C)session key
D)primitive root
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A __________ GF2m)consists of 2m elements together with addition and multiplication operations that can be defined over polynomials.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
If three points on an elliptic curve lie on a straight line their sum is __________ .

A)0
B)1
C)6
D)3
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 and in which calculations are performed modulo p for a __________ over Zp.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
____________ makes use of elliptic curves in which the variables and coefficients are all restricted to elements of a finite field.

A)Prime curve
B)Elliptic curve cryptographyECC)
C)abelian group
D)Micali-Schnorr
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
Two families of elliptic curves are used in cryptographic applications: prime curves over Zp and __________ over GF2m).
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
The principal attraction of __________,compared to RSA,is that it appears to offer equal security for a far smaller key size,thereby reducing processing overhead.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The Diffie-Hellman key exchange formula for calculation of a secret key by User A is:

A)K = nB x PA
B)K = nA x PB
C)K = nP x BA
D)K = nA x PA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
To form a cryptographic system using __________ we need to find a "hard-problem" corresponding to factoring the product of two primes or taking the discrete logarithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
The addition operation in elliptic curve cryptography is the counterpart of modular multiplication in RSA,and multiple addition is the counterpart of __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
The __________ key exchange involves multiplying pairs of nonzero integers modulo a prime number q.Keys are generated by exponentiation over the group with exponentiation defined as repeated multiplication.

A)Diffie-Hellman
B)Rabin-Miller
C)Micali-Schnorr
D)ElGamal
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
For a ___________ defined over GF2m),the variables and coefficients all take on values in GF2m)and in calculations are performed over GF2m).

A)cubic equation
B)prime curve
C)binary curve
D)abelian group
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
An encryption/decryption system requires a point G and an elliptic group _________ as parameters.

A)Eba,q)
B)Eaq,b)
C)Ena,b)
D)Eqa,b)
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
An)___________ G is a set of elements with a binary operation,denoted by *,that associates to each ordered pair a,b)of elements in G an element a*b)in
G.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
For cryptography the variables and coefficients are restricted to elements in a __________ field.

A)primitive
B)infinite
C)public
D)finite
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
Included in the definition of an elliptic curve is a single element denoted O and called the point at infinity or the __________ .

A)prime point
B)zero point
C)abelian point
D)elliptic point
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
__________ are best for software applications.

A)Binary curves
B)Prime curves
C)Bit operations
D)Abelian groups
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography schemes,including key exchange,encryption,and ___________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
The key exchange protocol vulnerability can be overcome with the use of digital signatures and __________ certificates.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
Eqa,b)is an elliptic curve with parameters a,b,and q,where _________ is a prime or an integer of the form 2m.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The fastest known technique for taking the elliptic curve logarithm is known as the _________ method.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The __________ pseudorandom number generator is recommended in the ANSI standard X9.82 Random Number Generation)and in the ISO standard 18031 Random Bit Generation).
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Asymmetric algorithms are typically much slower than symmetric algorithms so they are not used to generate open-ended __________ generator bit streams.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The PRNG variable ___________ is defined in NIST SP 800-90 as a number associated with the amount of work required to break a cryptographic algorithm or system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.