question stringlengths 6 3.53k | text stringlengths 17 2.05k | source stringclasses 1
value |
|---|---|---|
If Alice receives a message proven to be coming from Bob, we say that the message is\dots | When Bob receives the newly enciphered message, he believes it came from Alice. Alice sends a message to Bob, which is intercepted by Mallory: Alice "Hi Bob, it's Alice. Give me your key." | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
If Alice receives a message proven to be coming from Bob, we say that the message is\dots | → Mallory Bob Mallory relays this message to Bob; Bob cannot tell it is not really from Alice: Alice Mallory "Hi Bob, it's Alice. Give me your key." → Bob Bob responds with his encryption key: Alice Mallory ← Bob Mallory replaces Bob's key with her own, and relays this to Alice, claiming that it is Bob's key: Alice ← ... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which cryptographic primitive(s) is (are) used in S/Key - OTP ? | Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems. These routines include, but are not limited to, one-way hash functions and encryption functions. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which cryptographic primitive(s) is (are) used in S/Key - OTP ? | In this regard, it is similar to storing unsalted 64-bit hashes of strong, unique passwords. The S/KEY protocol can loop. If such a loop were created in the S/KEY chain, an attacker could use user's key without finding the original value, and possibly without tipping off the valid user. The pathological case of this wo... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Let $(e,N)$ be the public parameters of the RSA cryptosystem. What is the advantage of taking a \emph{small} value for $e$? | Choose an integer e such that 2 < e < λ(n) and gcd(e, λ(n)) = 1; that is, e and λ(n) are coprime. e having a short bit-length and small Hamming weight results in more efficient encryption – the most commonly chosen value for e is 216 + 1 = 65537. The smallest (and fastest) possible value for e is 3, but such a small va... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Let $(e,N)$ be the public parameters of the RSA cryptosystem. What is the advantage of taking a \emph{small} value for $e$? | In order to reduce encryption or signature verification time, it is useful to use a small public exponent ( e {\displaystyle e} ). In practice, common choices for e {\displaystyle e} are 3, 17 and 65537 ( 2 16 + 1 ) {\displaystyle (2^{16}+1)} . These values for e are Fermat primes, sometimes referred to as F 0 , F 2 {\... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Let $p$ and $q$ be two distinct prime numbers and let $x \in \mathbf{Z}_{pq}^*$. Which of the following assertion is always true in $\mathbf{Z}_{pq}^*$? | We claim that in fact this is so for one prime number only. Suppose per contra that p and q are two distinct primes with absolute value strictly less than 1. Let k be a positive integer such that | p | ∗ k {\displaystyle |p|_{*}^{k}} and | q | ∗ k {\displaystyle |q|_{*}^{k}} are smaller than 1 / 2 {\displaystyle 1/2} . | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Let $p$ and $q$ be two distinct prime numbers and let $x \in \mathbf{Z}_{pq}^*$. Which of the following assertion is always true in $\mathbf{Z}_{pq}^*$? | This yields a contradiction, as 1 = | 1 | ∗ ≤ | a | ∗ | p | ∗ k + | b | ∗ | q | ∗ k < | a | ∗ + | b | ∗ 2 ≤ 1. {\displaystyle 1=|1|_{*}\leq |a|_{*}|p|_{*}^{k}+|b|_{*}|q|_{*}^{k}<{\frac {|a|_{*}+|b|_{*}}{2}}\leq 1.} This means that there exists a unique prime p such that | p | ∗ < 1 {\displaystyle |p|_{*}<1} and that fo... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Let $h$ be a cryptographic hash function based on the Merkle-Damg{\aa}rd scheme. The Merkle-Damg{\aa}rd Theorem states that\dots | Benaloh and de Mare define a one-way hash function as a family of functions h ℓ: X ℓ × Y ℓ → Z ℓ {\displaystyle h_{\ell }:X_{\ell }\times Y_{\ell }\to Z_{\ell }} which satisfy the following three properties: For all ℓ ∈ Z , x ∈ X ℓ , y ∈ Y ℓ {\displaystyle \ell \in \mathbb {Z} ,x\in X_{\ell },y\in Y_{\ell }} , one can ... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Let $h$ be a cryptographic hash function based on the Merkle-Damg{\aa}rd scheme. The Merkle-Damg{\aa}rd Theorem states that\dots | Let h: S × X → { 0 , 1 } m {\textstyle h\colon {\mathcal {S}}\times {\mathcal {X}}\rightarrow \{0,\,1\}^{m}} be a 2-universal hash function. If m ≤ H ∞ ( X ) − 2 log ( 1 ε ) {\textstyle m\leq H_{\infty }(X)-2\log \left({\frac {1}{\varepsilon }}\right)} then for S uniform over S {\displaystyle {\mathcal {S}}} and inde... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
$\mathbb{Z}_{37}^*$ denotes ... | Both Z p {\displaystyle \mathbb {Z} _{p}} and Q p {\displaystyle \mathbb {Q} _{p}} are uncountable and have the cardinality of the continuum. For Z p , {\displaystyle \mathbb {Z} _{p},} this results from the p-adic representation, which defines a bijection of Z p {\displaystyle \mathbb {Z} _{p}} on the power set { 0 , ... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
$\mathbb{Z}_{37}^*$ denotes ... | Here, Z {\displaystyle \mathbb {Z} } is the set of integers, and N {\displaystyle \mathbb {N} } is the set of non-negative integers. Here, all letters represent integers. We say that a map T: N k → N {\displaystyle T:\mathbb {N} ^{k}\rightarrow \mathbb {N} } is piecewise linear if T {\displaystyle T} can be defined by ... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Visual cryptography is a nice visual application of \ldots | (2014). An Introduction to Mathematical Cryptography (2nd ed.). doi:10.1007/978-1-4939-1711-2. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Visual cryptography is a nice visual application of \ldots | Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decrypted information appears as a visual image. One of the best-known techniques has been credited to Moni Naor and Adi Shamir, who developed it in 1994. They demonstrated a vi... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{incorrect} statement. | Select y ~ ∈ { 1 , . . . | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{incorrect} statement. | . . VERIFY-SELECTION . | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which one of these is a closed set? | Some sets are both open and closed and are called clopen sets. The ray [ 1 , + ∞ ) {\displaystyle [1,+\infty )} is closed. The Cantor set is an unusual closed set in the sense that it consists entirely of boundary points and is nowhere dense. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which one of these is a closed set? | The sum of a compact set and a closed set is closed. However, the sum of two closed subsets may fail to be closed (see this footnote for examples). | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \textbf{incorrect} assertion. | "Fl." for flashing, "F." for fixed. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \textbf{incorrect} assertion. | If so, attempt to position cursor at that line. If it exists, begin interpretation there; if not, report an error. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{correct} statement. The Plain RSA Signature scheme | . . VERIFY-SELECTION . | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{correct} statement. The Plain RSA Signature scheme | One can verify that a signature ( r , s ) {\displaystyle \left(r,s\right)} is a valid signature for a message m {\displaystyle m} as follows: Verify that 0 < r < q {\displaystyle 0 | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which of the following is an element of $\mathbb{Z}_{60}^*$? | The number 60 is a unitary perfect number, because 1, 3, 4, 5, 12, 15, and 20 are its proper unitary divisors, and 1 + 3 + 4 + 5 + 12 + 15 + 20 = 60. The first five, and only known, unitary perfect numbers are 6 = 2 × 3 {\displaystyle 6=2\times 3} , 60 = 2 2 × 3 × 5 {\displaystyle 60=2^{2}\times 3\times 5} , 90 = 2 × 3... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which of the following is an element of $\mathbb{Z}_{60}^*$? | The elements of Z {\displaystyle \mathbb {Z} } ×15 are the congruence classes {1, 2, 4, 7, 8, 11, 13, 14}; there are φ(15) = 8 of them. x x, x2, x3, ... (mod 15) 1: 1 2: 2, 4, 8, 1 4: 4, 1 7: 7, 4, 13, 1 8: 8, 4, 2, 1 11: 11, 1 13: 13, 4, 7, 1 14: 14, 1 Since there is no number whose order is 8, there are no primitive ... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which of the following algorithms is \emph{not} a hash function? | Selected schemes for the purpose of hashing: SWIFFT. Lattice Based Hash Function (LASH). | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which of the following algorithms is \emph{not} a hash function? | h {\displaystyle h}: a collision resistant hash function with |q|-bit digests. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{correct} answer. | Select y ~ ∈ { 1 , . . . | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{correct} answer. | If it returns "yes", then return "yes". Otherwise, run WSO(K,y,d/3). If it returns "yes", then return "yes". Otherwise, return "no"; see: 52 for proof of correctness. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \emph{false} assertion. Given a ring $R$, $R^\star$ is\ldots | If R is an associative ring, then R can be given the bracket product = xy − yx. Of course then xy = yx if and only if = 0. If we denote the set R with the bracket product as LR, then clearly the ring centralizer of S in R is equal to the Lie ring centralizer of S in LR. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \emph{false} assertion. Given a ring $R$, $R^\star$ is\ldots | In a model of the ring R {\displaystyle {\mathbb {R} }} , one can define a non-trivial positivity predicate 0 < x {\displaystyle 0 | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{incorrect} statement. Bluetooth is | Several open-source implementations of the JSR-82 specification are available: AvetanaBluetooth Implementation BlueCove: Java Library for Bluetooth | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{incorrect} statement. Bluetooth is | . . VERIFY-SELECTION . | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which cipher is AES? | Secretary of Commerce. AES is available in many different encryption packages, and is the first (and only) publicly accessible cipher approved by the U.S. National Security Agency (NSA) for top secret information when used in an NSA approved cryptographic module. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which cipher is AES? | AES encryption: 128-bit block encryption cipher operating in CTR mode with user-selectable 128, 192 or 256-bit key. Slow-speed side channel for short and repeated data transfers, e.g. GNSS position data or telemetry. Text messaging. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which of the following algorithms is a stream cipher? | A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream. Since encryption of each digit i... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which of the following algorithms is a stream cipher? | The table below shows the support of various stream ciphers. Stream ciphers are defined as using plain text digits that are combined with a pseudorandom cipher digit stream. Stream ciphers are typically faster than block ciphers and may have lower hardware complexity, but may be more susceptible to attacks. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Consider a public key cryptosystem. The channel used to transmit the public key has to be\dots | Suppose Bob wishes to send a message, m, to Alice whose public key is (Hpub, t): Bob encodes the message, m, as a binary string em' of length n and weight at most t. Bob computes the ciphertext as c = HpubeT. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Consider a public key cryptosystem. The channel used to transmit the public key has to be\dots | It is also possible to use Diffie–Hellman as part of a public key infrastructure, allowing Bob to encrypt a message so that only Alice will be able to decrypt it, with no prior communication between them other than Bob having trusted knowledge of Alice's public key. Alice's public key is ( g a mod p , g , p ) {\display... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
KEM/DEM refers to\dots | PM's dots are used in a manner similar to parentheses. Each dot (or multiple dot) represents either a left or right parenthesis or the logical symbol ∧. More than one dot indicates the "depth" of the parentheses, for example, ". ", ":" or ":. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
KEM/DEM refers to\dots | This is done with a naming convention of "Dxx.x" or "Kxx.x". Example: Input Data Bits: ABCDEFGH Data is split: ABC DEFGH Data is shuffled: DEFGH ABCNow these bits are converted to decimal in the way they are paired. Input data C3 (HEX) = 11000011 = 110 00011 = 00011 110 = 3 6 E 8B/10B = D03.6 | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \textbf{false} statement. | Suppose we are given a Boolean expressions: B 1 = ( v 3 ∨ ¬ v 2 ) ∧ ( ¬ v 1 ∨ ¬ v 3 ) {\displaystyle B_{1}=(v_{3}\lor \neg v_{2})\wedge (\neg v_{1}\lor \neg v_{3})} B 2 = ( v 3 ∨ ¬ v 2 ) ∧ ( ¬ v 1 ∨ ¬ v 3 ) ∧ ( ¬ v 1 ∨ v 2 ) . {\displaystyle B_{2}=(v_{3}\lor \neg v_{2})\wedge (\neg v_{1}\lor \neg v_{3})\wedge (\neg v_{... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \textbf{false} statement. | . In particular, if v i = ∑ j = 1 d i v i j e i j {\displaystyle {\textbf {v}}_{i}=\sum _{j=1}^{d_{i}}v_{ij}{\textbf {e}}_{ij}\!} | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select \emph{incorrect} statement. The brute force technique against a cipher with key $256$ bits is | The very simple key schedule makes IDEA subject to a class of weak keys; some keys containing a large number of 0 bits produce weak encryption. These are of little concern in practice, being sufficiently rare that they are unnecessary to avoid explicitly when generating keys randomly. A simple fix was proposed: XORing ... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select \emph{incorrect} statement. The brute force technique against a cipher with key $256$ bits is | The challenger selects a bit b ∈ {\displaystyle \scriptstyle \in } {0, 1} uniformly at random, and sends the challenge ciphertext C = E(PK, M b {\displaystyle \scriptstyle M_{b}} ) back to the adversary. The adversary is free to perform any number of additional computations or encryptions. Finally, the adversary output... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{weakest} algorithm. | Then a random selection is made similar to how the roulette wheel is rotated. While candidate solutions with a higher fitness will be less likely to be eliminated, there is still a chance that they may be eliminated because their probability of selection is less than 1 (or 100%). Contrast this with a less sophisticated... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{weakest} algorithm. | Algorithm selection (sometimes also called per-instance algorithm selection or offline algorithm selection) is a meta-algorithmic technique to choose an algorithm from a portfolio on an instance-by-instance basis. It is motivated by the observation that on many practical problems, different algorithms have different pe... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \textit{incorrect} assertion. | "I made an error in this transmission. Transmission will continue with the last word correctly sent." | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \textit{incorrect} assertion. | (/ indicates line break; some word breaks are uncertain) | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
The Moore law | Moore's law, named after Gordon Moore, is the observation and projection via historical trend that the number of transistors in integrated circuits, and therefore processors by extension, doubles every two years. The progress of processors has followed Moore's law closely. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
The Moore law | For this reason, many scientists believe that Moore’s Law will not hold forever and will soon reach a peak, since Moore's law is largely predicated on computational gains caused by improvements in micro-lithographic etching technologies. In producing these nanocircuits, there are many aspects involved. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{incorrect} statement. The Bluetooth project aims for | . . VERIFY-SELECTION . | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{incorrect} statement. The Bluetooth project aims for | - 囗 + お/頁 + selector 4 = 馘 | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \emph{false} assertion. The ambiguity issue in the decryption algorithm of the Rabin cryptosystem can be solved by\dots | Tentatively making these assumptions, the following partial decrypted message is obtained. heVeTCSWPeYVaWHaVSReQMthaYVaOeaWHRtatePFaMVaWHKVSTYhtZetheKeetPeJVSZaYPaRRGaReM WQhMGhMtQaReWGPSReHMtQaRaKeaTtMJTPRGaVaKaeTRaWHatthattMZeTWAWSQWtSWatTVaPMRtRSJ GSTVReaYVeatCVMUeMWaRGMeWtMJMGCSMWtSJOMeQtheVeQeVetQSVSTWHKPaGARCStRW... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \emph{false} assertion. The ambiguity issue in the decryption algorithm of the Rabin cryptosystem can be solved by\dots | Decrypting produces three false results in addition to the correct one, so that the correct result must be guessed. This is the major disadvantage of the Rabin cryptosystem and one of the factors which have prevented it from finding widespread practical use. If the plaintext is intended to represent a text message, gue... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
What is the order of $2^{124}$ in $(\mathbb{Z}_{2^{128}},+)$? | The twelfth root of two (21/12 or 12√2 ≈ 1.059463...), using "standard notation": 2 12 = 1 + 1 12 + 11 2 + 13 36 + 23 2 + 25 60 + 35 2 + 37 84 + 47 2 + ⋱ = 1 + 2 ⋅ 1 36 − 1 − 11 ⋅ 13 108 − 23 ⋅ 25 180 − 35 ⋅ 37 252 − 47 ⋅ 49 324 − ⋱ . {\displaystyle {\sqrt{2}}=1+{\cfrac {1}{12+{\cfrac {11}{2+{\cfrac {13}{36+{\cfrac {23... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
What is the order of $2^{124}$ in $(\mathbb{Z}_{2^{128}},+)$? | It is trivial if n is even. If n is 1 mod 4 it has order 1 or 2; in particular it has order 1 if n is 1, 5, 13, 29, or 61, and William Browder (1969) proved that it has order 2 if n = 1 {\displaystyle n=1} mod 4 is not of the form 2 k − 3 {\displaystyle 2^{k}-3} . It follows from the now almost completely resolved Kerv... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which problem in communication is \emph{not} treated by cryptography? | Yet, it has been shown that even quantum communication does not allow the secure implementation of many other two-party cryptographic tasks. These all form instances of secure function evaluation. An example is oblivious transfer. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which problem in communication is \emph{not} treated by cryptography? | A commonly cited sufficient condition for the existence of unbreakable encryption is the existence of one-way functions, but it is conceivable that some physical means might also achieve it. On top of this, they also showed that the graph nonisomorphism problem, the complement of the graph isomorphism problem, has a ze... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
What are the complexities for the single-target dictionary attacks, when there are $N$ keys? | Attacks that allow distinguishing ciphertext from random data. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
What are the complexities for the single-target dictionary attacks, when there are $N$ keys? | A polynomial-time attack, for Ω ( n ) {\displaystyle \Omega (n)} concurrent executions, was shown in 2020 by Benhamouda, Lepoint, Raykova, and Orrù. Schnorr also suggested enhancements for securing blind signatures schemes based on discrete logarithm problem. == References == | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \emph{incorrect} assertion. The Diffie-Hellman key agreement protocol \ldots | Diffie–Hellman (RFC 3526) ECDH (RFC 4753) | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \emph{incorrect} assertion. The Diffie-Hellman key agreement protocol \ldots | The Syslog Protocol. RFC 5424. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which of these components was not part of the Enigma machine? | Like other rotor machines, the Enigma machine is a combination of mechanical and electrical subsystems. The mechanical subsystem consists of a keyboard; a set of rotating disks called rotors arranged adjacently along a spindle; one of various stepping components to turn at least one rotor with each key press, and a ser... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which of these components was not part of the Enigma machine? | This assembly acted similarly to other rotor machines, such as the Enigma; when a plaintext letter was entered, a signal would enter one side of the bank and exit the other, denoting the ciphertext letter. Unlike the Enigma, there was no reflector. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Consider password-based access control. Tick the \textit{incorrect} assertion. | Password Management System A console based password management program | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Consider password-based access control. Tick the \textit{incorrect} assertion. | Another security consideration is the ability of malicious software to spoof dialogs that look like legitimate security confirmation requests. If the user were to input credentials into a fake dialog, thinking the dialog was legitimate, the malicious software would then know the user's password. If the Secure Desktop o... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{incorrect} statement. In ElGamal signature | . . VERIFY-SELECTION . | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select the \emph{incorrect} statement. In ElGamal signature | One can verify that a signature ( r , s ) {\displaystyle \left(r,s\right)} is a valid signature for a message m {\displaystyle m} as follows: Verify that 0 < r < q {\displaystyle 0 | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
You are given the task of choosing the parameters of a hash function. What value of the output will you recommend in order to be minimal and secure against second preimage attacks? | The computational infeasibility of a first preimage attack on an ideal hash function assumes that the set of possible hash inputs is too large for a brute force search. However if a given hash value is known to have been produced from a set of inputs that is relatively small or is ordered by likelihood in some way, the... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
You are given the task of choosing the parameters of a hash function. What value of the output will you recommend in order to be minimal and secure against second preimage attacks? | By definition, an ideal hash function is such that the fastest way to compute a first or second preimage is through a brute-force attack. For an n-bit hash, this attack has a time complexity 2n, which is considered too high for a typical output size of n = 128 bits. If such complexity is the best that can be achieved b... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
$\mathrm{GF}(2^k)$ is represented by the set of\dots | Let X n {\displaystyle X^{n}} be an n-dimensional vector space over the finite field G F ( q N ) {\displaystyle GF\left({q^{N}}\right)} , where q {\displaystyle q} is a power of a prime and N {\displaystyle N} is a positive integer. Let ( u 1 , u 2 , … , u N ) {\displaystyle \left(u_{1},u_{2},\dots ,u_{N}\right)} , wit... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
$\mathrm{GF}(2^k)$ is represented by the set of\dots | Roughly it asserts that the matrix coefficients for G, suitably renormalized, are an orthonormal basis of L2(G). In particular, L 2 ( G ) {\displaystyle L^{2}(G)} decomposes into an orthogonal direct sum of all the irreducible unitary representations, in which the multiplicity of each irreducible representation is equa... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Thick the \emph{incorrect} assertion. | asserts that if p {\displaystyle p\,\!} is valid then so is q {\displaystyle q\,\!} | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Thick the \emph{incorrect} assertion. | Squeeze { '__'e.1 = ; s.A e.1 = s.A ; = ; }; | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
According to the Kerckhoffs Principle: | Kerckhoffs's principle (also called Kerckhoffs's desideratum, assumption, axiom, doctrine or law) of cryptography was stated by Dutch-born cryptographer Auguste Kerckhoffs in the 19th century. The principle holds that a cryptosystem should be secure, even if everything about the system, except the key, is public knowle... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
According to the Kerckhoffs Principle: | A generalization some make from Kerckhoffs's principle is: "The fewer and simpler the secrets that one must keep to ensure system security, the easier it is to maintain system security." Bruce Schneier ties it in with a belief that all security systems must be designed to fail as gracefully as possible: principle appli... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
KEM \dots | Ket, a Yeniseian language (split-S) | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
KEM \dots | Note that one can also overcome the problem with containing dots using the \yahnodots command. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \emph{false} assertion. Two-keys triple DES\dots | Squeeze { '__'e.1 = ; s.A e.1 = s.A ; = ; }; | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \emph{false} assertion. Two-keys triple DES\dots | asserts that if p {\displaystyle p\,\!} is valid then so is q {\displaystyle q\,\!} | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \textbf{true} statement regarding $\mathbb{Z}_p^*$, where $p$ is an arbitrary prime number. | This formulation is from Tenenbaum. : 302 Other formulations are in Narkiewicz: 243 and in Cojocaru & Murty. : 45–46 Suppose f is an additive complex-valued arithmetic function, and write p for an arbitrary prime and ν for an arbitrary positive integer. Write A ( x ) = ∑ p ν ≤ x f ( p ν ) p − ν ( 1 − p − 1 ) {\displays... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \textbf{true} statement regarding $\mathbb{Z}_p^*$, where $p$ is an arbitrary prime number. | When Carl Friedrich Gauss first introduced the notion of complex integers Z, he observed that the ordinary prime numbers may factor further in this new set of integers. In fact, if a prime p is congruent to 1 mod 4, then it factors into a product of two distinct prime gaussian integers, or "splits completely"; if p is ... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \textbf{false} statement regarding the DES round function. | One then has F = d A . {\displaystyle {\textbf {F}}=d{\textbf {A}}.} | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \textbf{false} statement regarding the DES round function. | . In particular, if v i = ∑ j = 1 d i v i j e i j {\displaystyle {\textbf {v}}_{i}=\sum _{j=1}^{d_{i}}v_{ij}{\textbf {e}}_{ij}\!} | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which of the following ciphers is based on arithmetics over the finite field $\mathrm{GF}(2^8)$? | The elements of GF(2n), i.e. a finite field whose order is a power of two, are usually represented as polynomials in GF(2). Multiplication of two such field elements consists of multiplication of the corresponding polynomials, followed by a reduction with respect to some irreducible polynomial which is taken from the c... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which of the following ciphers is based on arithmetics over the finite field $\mathrm{GF}(2^8)$? | These spaces can also be augmented with a multiplication operation that makes them into a field GF(2n), but the multiplication operation cannot be a bitwise operation. When n is itself a power of two, the multiplication operation can be nim-multiplication; alternatively, for any n, one can use multiplication of polynom... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Ensuring the information integrity means that\dots | Data integrity demands maintaining and assuring the accuracy and completeness of data. A data owner always expects that her or his data in a cloud can be stored correctly and trustworthy. It means that the data should not be illegally tampered with, improperly modified, deliberately deleted, or maliciously fabricated. ... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Ensuring the information integrity means that\dots | The Clark–Wilson integrity model provides a foundation for specifying and analyzing an integrity policy for a computing system. The model is primarily concerned with formalizing the notion of information integrity. Information integrity is maintained by preventing corruption of data items in a system due to either erro... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Given an odd prime $p$, for any $a \in \mathbb{Z}_p$ the equation | Again, the result is trivial for p = 2, so suppose p is an odd prime, p ≥ 3. Consider the polynomial g ( x ) = ( x − 1 ) ( x − 2 ) ⋯ ( x − ( p − 1 ) ) . {\displaystyle g(x)=(x-1)(x-2)\cdots (x-(p-1)).} g has degree p − 1, leading term xp − 1, and constant term (p − 1)!. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Given an odd prime $p$, for any $a \in \mathbb{Z}_p$ the equation | Let p {\displaystyle p} be an odd prime number. Consider the polynomial f ( x ) = a 0 + a 1 x + ⋯ + a n x n {\textstyle f(x)=a_{0}+a_{1}x+\cdots +a_{n}x^{n}} over the field Z p {\displaystyle \mathbb {Z} _{p}} of remainders modulo p {\displaystyle p} . The algorithm should find all λ {\displaystyle \lambda } in Z p {\d... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which one of the following notions is not in the fundamental trilogy of cryptography? | Supplanted by Cryptography Engineering. Smart, Nigel (2004). Cryptography: An introduction ISBN 0-07-709987-7. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Which one of the following notions is not in the fundamental trilogy of cryptography? | Equivalent to Applied Cryptography in many ways, but somewhat more mathematical. For the technically inclined. Covers few meta-cryptographic topics, such as crypto system design. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Consider a mobile station (MS) with a SIM card associated to a home network (HN). The MS tries to connect to a visited network (VN). In the GSM authentication, who knows the key $K_i$? | The current cellular location of the phone (i.e., which BTS it is at) is entered into the VLR record and will be used during a process called paging when the GSM network wishes to locate the mobile phone. Every SIM card contains a secret key, called the Ki, which is used to provide authentication and encryption service... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Consider a mobile station (MS) with a SIM card associated to a home network (HN). The MS tries to connect to a visited network (VN). In the GSM authentication, who knows the key $K_i$? | GSM 02.09 defines the following security features on Um: authentication of subscribers by the network, encryption on the channel, anonymization of transactions (at least partially)Um also supports frequency hopping (GSM 05.01 Section 6), which is not specifically intended as a security feature but has the practical eff... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select \emph{incorrect} statement. Brithday paradox | Select y ~ ∈ { 1 , . . . | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Select \emph{incorrect} statement. Brithday paradox | Statements are separated by one semicolon (;) | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
The Kerckhoffs principle says: | Kerckhoffs's principle (also called Kerckhoffs's desideratum, assumption, axiom, doctrine or law) of cryptography was stated by Dutch-born cryptographer Auguste Kerckhoffs in the 19th century. The principle holds that a cryptosystem should be secure, even if everything about the system, except the key, is public knowle... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
The Kerckhoffs principle says: | A generalization some make from Kerckhoffs's principle is: "The fewer and simpler the secrets that one must keep to ensure system security, the easier it is to maintain system security." Bruce Schneier ties it in with a belief that all security systems must be designed to fail as gracefully as possible: principle appli... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \emph{correct} assertion. The Vernam cipher provides \dots | Note that one can also overcome the problem with containing dots using the \yahnodots command. | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Tick the \emph{correct} assertion. The Vernam cipher provides \dots | . ) {\displaystyle \,\vert \psi '\rangle \langle \psi '\vert +(...)} , where the dots denote components of ρ out {\displaystyle \rho _{\operatorname {out} }} resulting from errors not properly corrected by the protocol. It follows that This fidelity is to be compared with the corresponding fidelity obtained when no err... | https://www.kaggle.com/datasets/conjuring92/wiki-stem-corpus |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.