Deck 14: Lightweight Cryptography and Post-Quantum Cryptography
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 14: Lightweight Cryptography and Post-Quantum Cryptography
1
A (n)__________ uses a microcontroller, is not programmable once the program logic for the device has been burned into ROM, and has no interaction with a user.
A)deeply embedded system
B)constrained device
C)lattice device
D)embedded system
A)deeply embedded system
B)constrained device
C)lattice device
D)embedded system
A
2
__________ is a data collection technology that uses electronic tags attached to items to allow the items to be identified and tracked by a remote system.
A)RFID
B)NtRU
C)EPC
D)CRYPtOREC
A)RFID
B)NtRU
C)EPC
D)CRYPtOREC
A
3
the Iot depends heavily on deeply embedded systems.
True
4
Chip area is of concern when a cryptographic algorithm is
implemented in hardware.
implemented in hardware.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
An enterprise should have policies for the maximum cryptoperiod
of each key type.
of each key type.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Microcontrollers are heavily utilized in automation processes.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
A(n) __________ can be defined as any device that includes a computer chip, but that is not a general-purpose workstation, desktop, or laptop computer.
A)constrained device
B)microcontroller
C)embedded system
D)cryptosystem
A)constrained device
B)microcontroller
C)embedded system
D)cryptosystem
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Constrained devices are not particularly vulnerable to side-channel
attacks because they are physically secure.
attacks because they are physically secure.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
there are very few types of devices with embedded systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
the term __________ refers to the characteristic that a cryptographic algorithm makes minimal resource demands on the host system.
A)entanglement
B)lightweight
C)qubit
D)superposition
A)entanglement
B)lightweight
C)qubit
D)superposition
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
RFID devices require cryptographic algorithms that use a
large amount of logic and memory.
large amount of logic and memory.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Cryptosystems that employ symmetric ciphers or hash functions
cannot be made quantum safe.
cannot be made quantum safe.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
A(n) __________ is a device with limited volatile and nonvolatile memory, limited processing power, and a low data rate transceiver.
A)microprocessor
B)class 3 device
C)Iot
D)constrained device
A)microprocessor
B)class 3 device
C)Iot
D)constrained device
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
traditional hash functions may not meet the requirements for
implementation on constrained devices.
implementation on constrained devices.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
A microprocessor is also called a "computer on a chip".
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
the EtSI Quantum Safe Cryptography Industry Specification
Group was formed in 2014 to assess and make recommendations for quantum-safe cryptographic primitives and protocols.
Group was formed in 2014 to assess and make recommendations for quantum-safe cryptographic primitives and protocols.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
An example of a lightweight cryptographic block cipher is the
Scalable Encryption Algorithm.
Scalable Encryption Algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Post-quantum cryptography is concerned with the security of
asymmetric cryptographic algorithms.
asymmetric cryptographic algorithms.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
For any given algorithm, the longer the key and the more rounds,
the greater the security.
the greater the security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Digital signatures is one of the categories of asymmetric
algorithms that are vulnerable to quantum computing.
algorithms that are vulnerable to quantum computing.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
the main elements of a RFID system are tags and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) ___________ allows data that is being read or tansmitted to be checked for errors and, when necessary, corrected.
A)ECC
B)lattice code
C)CBC
D)superposition
A)ECC
B)lattice code
C)CBC
D)superposition
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ refers to the use of electroinics and software within a product that has a specific function or set of functions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
__________ searches an unordered list in O(n) time, while conventional algorithms require O(n).
A)Shor's Factoring Algorithm
B)EtSI's Algorithm
C)Grover's Algorithm
D)Merkle's Algorithm
A)Shor's Factoring Algorithm
B)EtSI's Algorithm
C)Grover's Algorithm
D)Merkle's Algorithm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
Information in a quantum computer is represented as __________ .
A)qubits
B)qubytes
C)quinfo
D)qucis
A)qubits
B)qubytes
C)quinfo
D)qucis
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
the _________ is designed to be stored on a RFID tag and it provides a universal identifier for every physical object anywhere in the world.
A)NtU
B)EPC
C)UPC
D)NAND
A)NtU
B)EPC
C)UPC
D)NAND
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
__________ systems are dedicated, single-purpose devices that detect something in the environment, perform a basic level of processing, and then do something with the results.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
An example of a lightweight cryptographic hash function is __________ .
A)SEA
B)Grain-128
C)PHOtON
D)CRYP17
A)SEA
B)Grain-128
C)PHOtON
D)CRYP17
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
__________ proposed a technique that builds on the Lamport scheme, using the concept of a hash tree.
A)Shor
B)Grover
C)McEliece
D)Merkel
A)Shor
B)Grover
C)McEliece
D)Merkel
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
Public-key cryptography supports three critical cryptographic functionalities: public-key encryption, digital signatures, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
the most widely studied __________ is the NtRU family of cryptographic algorithms.
A)lattice-based approach
B)code-based approach
C)hash-based approach
D)multivariate polynomial approach
A)lattice-based approach
B)code-based approach
C)hash-based approach
D)multivariate polynomial approach
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
__________ is an example of a newly designed MAC.
A)HMAC
B)Lattice
C)Merkle root
D)SipHash
A)HMAC
B)Lattice
C)Merkle root
D)SipHash
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
__________ cryptography is concerned with the development of cryptographic algorithms that are secure against the potential development of quantum computers.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
A __________ is a single chip that contains the processor, nonvolatile memory for the program, volatile memory for input and output, a clock, and an I/O control unit.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
ISO 29192 defines a minimum security strength for lightweight cryptography of __________ bits.
A)80
B)128
C)64
D)112
A)80
B)128
C)64
D)112
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
A __________ is an attack enabled by a leakage of information from a physical cryptosystem.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
the __________ of a cryptographic key is the time span during which a specific
cryptogrphic key is authorized for use for its defined purpose.
cryptogrphic key is authorized for use for its defined purpose.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
For both block and stream ciphers, the implementation to meet design goals makes use of one of three major hardware architecture options: parallel (loop unrolled), round-wise (rolled), and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
__________ cryptography is a subfield of cryptography concerned with the development of cryptographic algorithms for resource-constrained devices.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
______ refers to schemes such as Diffie-Hellman key exchange.
A)Code-based cryptography
B)Cryptosystems
C)Key-Establishment Mechanisms
D)Superposition
A)Code-based cryptography
B)Cryptosystems
C)Key-Establishment Mechanisms
D)Superposition
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
the term __________ refers to a polynomial in more than one variable.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A __________ consists of a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
the term __________ refers to a polynomial of degree 2.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Many of the more efficient __________ signature schemes have the drawback that the signer must keep a record of the exact number of previously signed messages, and any error in this record will result in insecurity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
An example of efficient error correcting codes are __________ codes, which can be turned into a secure coding scheme by keeping the encoding and decoding functions a secret, and only publicly revealing a disguised encoding function that allows the mapping of a planintext message to a scrambled set of code words.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck