Answer the following statements true (T) or false (F)
1. The form of cubic equation appropriate for cryptographic applications for elliptic curves is somewhat different for GF(2m) than for Zp.
2. An encryption/decryption system requires that point Pm be encrypted as a plaintext.
3. The security of ECC depends on how difficult it is to determine k given kP and P.
4. A considerably larger key size can be used for ECC compared to RSA.
5. Since a symmetric block cipher produces an apparently random output it can serve as the basis of a pseudorandom number generator.
1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. TRUE
You might also like to view...
You can change the theme colors of a presentation from the ________ tab
A) Slide Show B) Design C) View D) Home
Which of the following is NOT an issue-specific policy?
A. Email retention policy B. Auditing policy C. File server logout policy D. Acceptable use policy E. Statements a, b, and c only F. Statements a, c, and d only G. All the statements