Answer the following statements true (T) or false (F)

1. Most of the products and standards that use public-key cryptography for encryption and digital signatures use RSA.
2. ECC is fundamentally easier to explain than either RSA or Diffie-Hellman.
3. A number of public-key ciphers are based on the use of an abelian group.
4. Elliptic curves are ellipses.
5. For determining the security of various elliptic curve ciphers it is of some interest to know the number of points in a finite abelian group defined over an elliptic curve.


1. TRUE
2. FALSE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

If you need to read or write registry entries from a batch files, then you can use ______________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Suppose A is an anonymous inner class in Test. A is compiled into a file named _________.

a. A.class b. Test$A.class c. A$Test.class d. Test$1.class e. Test&1.class

Computer Science & Information Technology

Are the numbers returned from the random.random() function really random? How are they generated? You will have to look up some information on random numbers on the Internet to answer this question.

What will be an ideal response?

Computer Science & Information Technology

A(n) ____ implementation prevents routing update information received on one physical interface from being rebroadcast to other devices through that same physical interface.

A. PVC B. keepalive C. SDLC D. split horizon

Computer Science & Information Technology