Diffie-Hellman protocol can be used as a building block for… Diffie-Hellman protocol can be used as a building block for efficient group key establishment. Read Details
In hash functions, collision resistant means that we cannot… In hash functions, collision resistant means that we cannot find any two different bitstrings so that they are mapped to the same hash value by using a hash function. Read Details
What is/are NOT true about side-channel attacks? (Select all… What is/are NOT true about side-channel attacks? (Select all that apply.) Read Details
Caesar cipher is less secure than Vigenere cipher. Caesar cipher is less secure than Vigenere cipher. Read Details
Kerckhoffs’ principle, named after Ron Rivest, Adi Shamir an… Kerckhoffs’ principle, named after Ron Rivest, Adi Shamir and Auguste Kerckhoffs, is widely accepted in the cryptographic research community. Read Details
When passing from the theoretical description of a cryptogra… When passing from the theoretical description of a cryptographic algorithm to its implementation, serious security weaknesses can be introduced even if the correct outputs of the algorithm are produced. Read Details
The information of memory access by a different process can… The information of memory access by a different process can be used in a side-channel attack. Read Details
What is preimage resistance? (Select the best answer.) What is preimage resistance? (Select the best answer.) Read Details
RSA-OAEP is a symmetric encryption scheme based on RSA and t… RSA-OAEP is a symmetric encryption scheme based on RSA and the Optimal Asymmetric Encryption Padding (OAEP) method. Read Details