Cryptography and Network Security

Computing

Quiz 14 :

Lightweight Cryptography and Post-Quantum Cryptography

Quiz 14 :

Lightweight Cryptography and Post-Quantum Cryptography

Question Type
search
arrow
A (n)__________ uses a microcontroller, is not programmable once the program logic for the device has been burned into ROM, and has no interaction with a user.
Free
Multiple Choice
Answer:

Answer:

A

Tags
Choose question tag
close menu
arrow
__________ is a data collection technology that uses electronic tags attached to items to allow the items to be identified and tracked by a remote system.
Free
Multiple Choice
Answer:

Answer:

A

Tags
Choose question tag
close menu
arrow
the Iot depends heavily on deeply embedded systems.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
Chip area is of concern when a cryptographic algorithm is implemented in hardware.
True False
Answer:
Tags
Choose question tag
close menu
arrow
An enterprise should have policies for the maximum cryptoperiod of each key type.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Microcontrollers are heavily utilized in automation processes.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A(n) __________ can be defined as any device that includes a computer chip, but that is not a general-purpose workstation, desktop, or laptop computer.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Constrained devices are not particularly vulnerable to side-channel attacks because they are physically secure.
True False
Answer:
Tags
Choose question tag
close menu
arrow
there are very few types of devices with embedded systems.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the term __________ refers to the characteristic that a cryptographic algorithm makes minimal resource demands on the host system.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
RFID devices require cryptographic algorithms that use a large amount of logic and memory.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Cryptosystems that employ symmetric ciphers or hash functions cannot be made quantum safe.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A(n) __________ is a device with limited volatile and nonvolatile memory, limited processing power, and a low data rate transceiver.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
traditional hash functions may not meet the requirements for implementation on constrained devices.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A microprocessor is also called a "computer on a chip".
True False
Answer:
Tags
Choose question tag
close menu
arrow
the EtSI Quantum Safe Cryptography Industry Specification Group was formed in 2014 to assess and make recommendations for quantum-safe cryptographic primitives and protocols.
True False
Answer:
Tags
Choose question tag
close menu
arrow
An example of a lightweight cryptographic block cipher is the Scalable Encryption Algorithm.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Post-quantum cryptography is concerned with the security of asymmetric cryptographic algorithms.
True False
Answer:
Tags
Choose question tag
close menu
arrow
For any given algorithm, the longer the key and the more rounds, the greater the security.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Digital signatures is one of the categories of asymmetric algorithms that are vulnerable to quantum computing.
True False
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 45