Ask a new question
Sign up
Login
Home
Discover Topics
Referral Program
Loans
Flashcards
Upload
Contact us
Topics
Topic
Computing
Study-set
Cryptography and Network Security
Prev
Quiz
Next
Quiz
Cryptography and Network Security
Computing
Quiz 10 :
Other Public-Key Cryptosystems
Study Flashcards
Looking for
Networking & Security Homework Help?
Unlock Package
Study Flashcards
Unlock Package
Quiz 10 :
Other Public-Key Cryptosystems
Prev
Quiz
Next
Quiz
Question Type
All
the key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.
Free
Multiple Choice
Q01
Answer:
Answer:
D
Tags
Add
Choose question tag
Discard
Apply
the __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.
Free
Multiple Choice
Q02
Answer:
Answer:
D
Tags
Add
Choose question tag
Discard
Apply
For determining the security of various elliptic curve ciphers it is of some interest to know the number of points in a finite abelian group defined over an elliptic curve.
Free
True False
Q03
Answer:
Answer:
True
Tags
Add
Choose question tag
Discard
Apply
the Diffie-Hellman key exchange is a simple public-key algorithm.
True False
Q04
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
the security of ElGamal is based on the difficulty of computing discrete logarithms.
True False
Q05
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
A considerably larger key size can be used for ECC compared to RS A.
True False
Q06
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
ECC is fundamentally easier to explain than either RSA or Diffie-Hellman.
True False
Q07
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
For purposes of ECC, elliptic curve arithmetic involves the use of an elliptic curve equation defined over an infinite field.
True False
Q08
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
the ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.
Multiple Choice
Q09
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
there is not a computational advantage to using ECC with a shorter key length than a comparably secure tS A.
True False
Q10
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
Most of the products and standards that use public-key cryptography for encryption and digital signatures use RS A.
True False
Q11
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
the Diffie-Hellman algorithm depends on the difficulty of computing discrete logarithms for its effectiveness.
True False
Q12
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
An encryption/decryption system requires that point P
m
be encrypted as a plaintext.
True False
Q13
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
A number of public-key ciphers are based on the use of an abelian group.
True False
Q14
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
the security of ECC depends on how difficult it is to determine k given kP and P.
True False
Q15
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
A(n) __________ is defined by an equation in two variables with coefficients.
Multiple Choice
Q16
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
Elliptic curves are ellipses.
True False
Q17
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
__________ can be used to develop a variety of elliptic curve cryptography schemes.
Multiple Choice
Q18
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
Since a symmetric block cipher produces an apparently random output it can serve as the basis of a pseudorandom number generator.
True False
Q19
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
the form of cubic equation appropriate for cryptographic applications for elliptic curves is somewhat different for GF(2
m
) than for Z
p
.
True False
Q20
Answer:
Unlock to view answer
Tags
Add
Choose question tag
Discard
Apply
Showing 1 - 20 of 45
Prev
1
...
2
...
3
...
Next