Course Hero Logo

Question 23 there are two main functions that trusted

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 7 - 8 out of 8 pages.

Question 23There are two main functions that Trusted Platform Modules (TPMs) carry out within systems today. Which ofthe following best describes these two functions?
Question 24An elliptic curve cryptosystem is an asymmetric algorithm. What sets it apart from other asymmetricalgorithms?
-It provides digital signatures, secure key distribution, and encryption.-It computes discrete logarithms in a finite field.-It is more efficient.Elliptic curves are rich mathematical structures that have shown usefulness in many different types of applications. Anelliptic curve cryptosystem (ECC) differs from other asymmetric algorithms due to its efficiency. ECC is more efficient thanany other asymmetric algorithm because of less intensive mathematics. In most cases, the longer the key, the moreprotection that is provided, but ECC can provide the same level of protection with a key size that is shorter than what RSArequires. Because longer keys require more resources to perform mathematical tasks, the smaller keys used in ECCrequire fewer resources of the device. And fewer resources make for a more efficient algorithm.Question 25Which security architecture model defines how to securely develop access rights between subjects andobjects?
End of preview. Want to read all 8 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
rhan
Tags
Cryptography, Encryption, Public key cryptography

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture