Deck 14: Lightweight Cryptography and Post-Quantum Cryptography

Full screen (f)
exit full mode
Question
A (n)__________ uses a microcontroller, is not programmable once the program logic for the device has been burned into ROM, and has no interaction with a user.

A)deeply embedded system
B)constrained device
C)lattice device
D)embedded system
Use Space or
up arrow
down arrow
to flip the card.
Question
__________ is a data collection technology that uses electronic tags attached to items to allow the items to be identified and tracked by a remote system.

A)RFID
B)NtRU
C)EPC
D)CRYPtOREC
Question
the Iot depends heavily on deeply embedded systems.
Question
Chip area is of concern when a cryptographic algorithm is
implemented in hardware.
Question
An enterprise should have policies for the maximum cryptoperiod
of each key type.
Question
Microcontrollers are heavily utilized in automation processes.
Question
A(n) __________ can be defined as any device that includes a computer chip, but that is not a general-purpose workstation, desktop, or laptop computer.

A)constrained device
B)microcontroller
C)embedded system
D)cryptosystem
Question
Constrained devices are not particularly vulnerable to side-channel
attacks because they are physically secure.
Question
there are very few types of devices with embedded systems.
Question
the term __________ refers to the characteristic that a cryptographic algorithm makes minimal resource demands on the host system.

A)entanglement
B)lightweight
C)qubit
D)superposition
Question
RFID devices require cryptographic algorithms that use a
large amount of logic and memory.
Question
Cryptosystems that employ symmetric ciphers or hash functions
cannot be made quantum safe.
Question
A(n) __________ is a device with limited volatile and nonvolatile memory, limited processing power, and a low data rate transceiver.

A)microprocessor
B)class 3 device
C)Iot
D)constrained device
Question
traditional hash functions may not meet the requirements for
implementation on constrained devices.
Question
A microprocessor is also called a "computer on a chip".
Question
the EtSI Quantum Safe Cryptography Industry Specification
Group was formed in 2014 to assess and make recommendations for quantum-safe cryptographic primitives and protocols.
Question
An example of a lightweight cryptographic block cipher is the
Scalable Encryption Algorithm.
Question
Post-quantum cryptography is concerned with the security of
asymmetric cryptographic algorithms.
Question
For any given algorithm, the longer the key and the more rounds,
the greater the security.
Question
Digital signatures is one of the categories of asymmetric
algorithms that are vulnerable to quantum computing.
Question
the main elements of a RFID system are tags and __________ .
Question
A(n) ___________ allows data that is being read or tansmitted to be checked for errors and, when necessary, corrected.

A)ECC
B)lattice code
C)CBC
D)superposition
Question
__________ refers to the use of electroinics and software within a product that has a specific function or set of functions.
Question
__________ searches an unordered list in O(n) time, while conventional algorithms require O(n).

A)Shor's Factoring Algorithm
B)EtSI's Algorithm
C)Grover's Algorithm
D)Merkle's Algorithm
Question
Information in a quantum computer is represented as __________ .

A)qubits
B)qubytes
C)quinfo
D)qucis
Question
the _________ is designed to be stored on a RFID tag and it provides a universal identifier for every physical object anywhere in the world.

A)NtU
B)EPC
C)UPC
D)NAND
Question
__________ systems are dedicated, single-purpose devices that detect something in the environment, perform a basic level of processing, and then do something with the results.
Question
An example of a lightweight cryptographic hash function is __________ .

A)SEA
B)Grain-128
C)PHOtON
D)CRYP17
Question
__________ proposed a technique that builds on the Lamport scheme, using the concept of a hash tree.

A)Shor
B)Grover
C)McEliece
D)Merkel
Question
Public-key cryptography supports three critical cryptographic functionalities: public-key encryption, digital signatures, and __________ .
Question
the most widely studied __________ is the NtRU family of cryptographic algorithms.

A)lattice-based approach
B)code-based approach
C)hash-based approach
D)multivariate polynomial approach
Question
__________ is an example of a newly designed MAC.

A)HMAC
B)Lattice
C)Merkle root
D)SipHash
Question
__________ cryptography is concerned with the development of cryptographic algorithms that are secure against the potential development of quantum computers.
Question
A __________ is a single chip that contains the processor, nonvolatile memory for the program, volatile memory for input and output, a clock, and an I/O control unit.
Question
ISO 29192 defines a minimum security strength for lightweight cryptography of __________ bits.

A)80
B)128
C)64
D)112
Question
A __________ is an attack enabled by a leakage of information from a physical cryptosystem.
Question
the __________ of a cryptographic key is the time span during which a specific
cryptogrphic key is authorized for use for its defined purpose.
Question
For both block and stream ciphers, the implementation to meet design goals makes use of one of three major hardware architecture options: parallel (loop unrolled), round-wise (rolled), and __________ .
Question
__________ cryptography is a subfield of cryptography concerned with the development of cryptographic algorithms for resource-constrained devices.
Question
______ refers to schemes such as Diffie-Hellman key exchange.

A)Code-based cryptography
B)Cryptosystems
C)Key-Establishment Mechanisms
D)Superposition
Question
the term __________ refers to a polynomial in more than one variable.
Question
A __________ consists of a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.
Question
the term __________ refers to a polynomial of degree 2.
Question
Many of the more efficient __________ signature schemes have the drawback that the signer must keep a record of the exact number of previously signed messages, and any error in this record will result in insecurity.
Question
An example of efficient error correcting codes are __________ codes, which can be turned into a secure coding scheme by keeping the encoding and decoding functions a secret, and only publicly revealing a disguised encoding function that allows the mapping of a planintext message to a scrambled set of code words.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Lightweight Cryptography and Post-Quantum Cryptography
1
A (n)__________ uses a microcontroller, is not programmable once the program logic for the device has been burned into ROM, and has no interaction with a user.

A)deeply embedded system
B)constrained device
C)lattice device
D)embedded system
A
2
__________ is a data collection technology that uses electronic tags attached to items to allow the items to be identified and tracked by a remote system.

A)RFID
B)NtRU
C)EPC
D)CRYPtOREC
A
3
the Iot depends heavily on deeply embedded systems.
True
4
Chip area is of concern when a cryptographic algorithm is
implemented in hardware.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
An enterprise should have policies for the maximum cryptoperiod
of each key type.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Microcontrollers are heavily utilized in automation processes.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
A(n) __________ can be defined as any device that includes a computer chip, but that is not a general-purpose workstation, desktop, or laptop computer.

A)constrained device
B)microcontroller
C)embedded system
D)cryptosystem
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Constrained devices are not particularly vulnerable to side-channel
attacks because they are physically secure.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
there are very few types of devices with embedded systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
the term __________ refers to the characteristic that a cryptographic algorithm makes minimal resource demands on the host system.

A)entanglement
B)lightweight
C)qubit
D)superposition
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
RFID devices require cryptographic algorithms that use a
large amount of logic and memory.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Cryptosystems that employ symmetric ciphers or hash functions
cannot be made quantum safe.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) __________ is a device with limited volatile and nonvolatile memory, limited processing power, and a low data rate transceiver.

A)microprocessor
B)class 3 device
C)Iot
D)constrained device
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
traditional hash functions may not meet the requirements for
implementation on constrained devices.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
A microprocessor is also called a "computer on a chip".
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
the EtSI Quantum Safe Cryptography Industry Specification
Group was formed in 2014 to assess and make recommendations for quantum-safe cryptographic primitives and protocols.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
An example of a lightweight cryptographic block cipher is the
Scalable Encryption Algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Post-quantum cryptography is concerned with the security of
asymmetric cryptographic algorithms.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
For any given algorithm, the longer the key and the more rounds,
the greater the security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Digital signatures is one of the categories of asymmetric
algorithms that are vulnerable to quantum computing.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
the main elements of a RFID system are tags and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) ___________ allows data that is being read or tansmitted to be checked for errors and, when necessary, corrected.

A)ECC
B)lattice code
C)CBC
D)superposition
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ refers to the use of electroinics and software within a product that has a specific function or set of functions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
__________ searches an unordered list in O(n) time, while conventional algorithms require O(n).

A)Shor's Factoring Algorithm
B)EtSI's Algorithm
C)Grover's Algorithm
D)Merkle's Algorithm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
Information in a quantum computer is represented as __________ .

A)qubits
B)qubytes
C)quinfo
D)qucis
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
the _________ is designed to be stored on a RFID tag and it provides a universal identifier for every physical object anywhere in the world.

A)NtU
B)EPC
C)UPC
D)NAND
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ systems are dedicated, single-purpose devices that detect something in the environment, perform a basic level of processing, and then do something with the results.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
An example of a lightweight cryptographic hash function is __________ .

A)SEA
B)Grain-128
C)PHOtON
D)CRYP17
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
__________ proposed a technique that builds on the Lamport scheme, using the concept of a hash tree.

A)Shor
B)Grover
C)McEliece
D)Merkel
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
Public-key cryptography supports three critical cryptographic functionalities: public-key encryption, digital signatures, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
the most widely studied __________ is the NtRU family of cryptographic algorithms.

A)lattice-based approach
B)code-based approach
C)hash-based approach
D)multivariate polynomial approach
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
__________ is an example of a newly designed MAC.

A)HMAC
B)Lattice
C)Merkle root
D)SipHash
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
__________ cryptography is concerned with the development of cryptographic algorithms that are secure against the potential development of quantum computers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
A __________ is a single chip that contains the processor, nonvolatile memory for the program, volatile memory for input and output, a clock, and an I/O control unit.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
ISO 29192 defines a minimum security strength for lightweight cryptography of __________ bits.

A)80
B)128
C)64
D)112
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
A __________ is an attack enabled by a leakage of information from a physical cryptosystem.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
the __________ of a cryptographic key is the time span during which a specific
cryptogrphic key is authorized for use for its defined purpose.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
For both block and stream ciphers, the implementation to meet design goals makes use of one of three major hardware architecture options: parallel (loop unrolled), round-wise (rolled), and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
__________ cryptography is a subfield of cryptography concerned with the development of cryptographic algorithms for resource-constrained devices.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
______ refers to schemes such as Diffie-Hellman key exchange.

A)Code-based cryptography
B)Cryptosystems
C)Key-Establishment Mechanisms
D)Superposition
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
the term __________ refers to a polynomial in more than one variable.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A __________ consists of a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
the term __________ refers to a polynomial of degree 2.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Many of the more efficient __________ signature schemes have the drawback that the signer must keep a record of the exact number of previously signed messages, and any error in this record will result in insecurity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
An example of efficient error correcting codes are __________ codes, which can be turned into a secure coding scheme by keeping the encoding and decoding functions a secret, and only publicly revealing a disguised encoding function that allows the mapping of a planintext message to a scrambled set of code words.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.