## Quiz 10 :

Other Public-Key Cryptosystems

Question Type

All

the key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.

Free

Multiple Choice

Answer:

Answer:

D

Choose question tag

the __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.

Free

Multiple Choice

Answer:

Answer:

D

Choose question tag

For determining the security of various elliptic curve
ciphers it is of some interest to know the number of
points in a finite abelian group defined over an elliptic
curve.

Free

True False

Answer:

Answer:

True

Choose question tag

Choose question tag

the security of ElGamal is based on the difficulty of
computing discrete logarithms.

True False

Answer:

Choose question tag

Choose question tag

Choose question tag

For purposes of ECC, elliptic curve arithmetic involves
the use of an elliptic curve equation defined over an
infinite field.

True False

Answer:

Choose question tag

the ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.

Multiple Choice

Answer:

Choose question tag

there is not a computational advantage to using ECC
with a shorter key length than a comparably secure tS
A.

True False

Answer:

Choose question tag

Most of the products and standards that use public-key
cryptography for encryption and digital signatures use RS
A.

True False

Answer:

Choose question tag

the Diffie-Hellman algorithm depends on the difficulty of
computing discrete logarithms for its effectiveness.

True False

Answer:

Choose question tag

An encryption/decryption system requires that point
P

_{m}be encrypted as a plaintext. True False

Answer:

Choose question tag

Choose question tag

the security of ECC depends on how difficult it is to
determine k given kP and P.

True False

Answer:

Choose question tag

A(n) __________ is defined by an equation in two variables with coefficients.

Multiple Choice

Answer:

Choose question tag

Choose question tag

__________ can be used to develop a variety of elliptic curve cryptography schemes.

Multiple Choice

Answer:

Choose question tag

Since a symmetric block cipher produces an apparently
random output it can serve as the basis of a
pseudorandom number generator.

True False

Answer:

Choose question tag

the form of cubic equation appropriate for
cryptographic applications for elliptic curves is
somewhat different for GF(2

^{m}) than for Z_{p}. True False

Answer:

Choose question tag