Answer the following statements true (T) or false (F)

1. The form of cubic equation appropriate for cryptographic applications for elliptic curves is somewhat different for GF(2m) than for Zp.
2. An encryption/decryption system requires that point Pm be encrypted as a plaintext.
3. The security of ECC depends on how difficult it is to determine k given kP and P.
4. A considerably larger key size can be used for ECC compared to RSA.
5. Since a symmetric block cipher produces an apparently random output it can serve as the basis of a pseudorandom number generator.

1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

You can change the theme colors of a presentation from the ________ tab

A) Slide Show B) Design C) View D) Home

Computer Science & Information Technology

Which of the following is NOT an issue-specific policy?

A. Email retention policy B. Auditing policy C. File server logout policy D. Acceptable use policy E. Statements a, b, and c only F. Statements a, c, and d only G. All the statements

Computer Science & Information Technology