Cryptography and Network Security

Computing

Quiz 10 :

Other Public-Key Cryptosystems

Quiz 10 :

Other Public-Key Cryptosystems

Question Type
search
arrow
the key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.
Free
Multiple Choice
Answer:

Answer:

D

Tags
Choose question tag
close menu
arrow
the __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.
Free
Multiple Choice
Answer:

Answer:

D

Tags
Choose question tag
close menu
arrow
For determining the security of various elliptic curve ciphers it is of some interest to know the number of points in a finite abelian group defined over an elliptic curve.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
the Diffie-Hellman key exchange is a simple public-key algorithm.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the security of ElGamal is based on the difficulty of computing discrete logarithms.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A considerably larger key size can be used for ECC compared to RS A.
True False
Answer:
Tags
Choose question tag
close menu
arrow
ECC is fundamentally easier to explain than either RSA or Diffie-Hellman.
True False
Answer:
Tags
Choose question tag
close menu
arrow
For purposes of ECC, elliptic curve arithmetic involves the use of an elliptic curve equation defined over an infinite field.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the ____________ protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
there is not a computational advantage to using ECC with a shorter key length than a comparably secure tS A.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Most of the products and standards that use public-key cryptography for encryption and digital signatures use RS A.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the Diffie-Hellman algorithm depends on the difficulty of computing discrete logarithms for its effectiveness.
True False
Answer:
Tags
Choose question tag
close menu
arrow
An encryption/decryption system requires that point Pm be encrypted as a plaintext.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A number of public-key ciphers are based on the use of an abelian group.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the security of ECC depends on how difficult it is to determine k given kP and P.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A(n) __________ is defined by an equation in two variables with coefficients.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Elliptic curves are ellipses.
True False
Answer:
Tags
Choose question tag
close menu
arrow
__________ can be used to develop a variety of elliptic curve cryptography schemes.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Since a symmetric block cipher produces an apparently random output it can serve as the basis of a pseudorandom number generator.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the form of cubic equation appropriate for cryptographic applications for elliptic curves is somewhat different for GF(2m) than for Zp.
True False
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 45