PrepAway - Latest Free Exam Questions & Answers

Which of the following is NOT a characteristic of the ElGamal public key cryptosystem?

Which of the following is NOT a characteristic of the ElGamal public
key cryptosystem?

PrepAway - Latest Free Exam Questions & Answers

A.
It is based on the discrete logarithm problem.
Choose a prime number, p.
Select a random number, j, such that j is relatively prime to p-1.
Recall that two numbers are relatively prime if they have no
common factors other than 1.
Select a random number, j, such that j is relatively prime to p-1. The
value of j must not be disclosed. Generate w = g j mod p.
It is required for B2 class systems in order to protect against covert
storage channels.

B.
It can be used to generate digital signatures.
Choose two random numbers, g and x (g and x must both be less
than p).
Generate w = g j mod p and z = y j M mod p.
Solve for z in the equation M = (xw + jz) mod (p-1). The solution to
this equation is beyond the scope of this coverage. Suffice to say that
an algorithm exists to solve for the variable z.
It is an operational assurance requirement that is specified in the
Orange Book.

C.
It can perform encryption, but not digital signatures.
Calculate y = g x mod p.
w and z comprise the ciphertext.
To decrypt the message, M, in the ElGamal system, calculate M =
z/w xmod p. This can be shown by substituting the values of z and w
in the equation as follows:
M = y j M mod p/ g jx mod p
Since y j = g xj mod p
M = (g xj M / g jx ) mod p
To sign a message, M, in the ElGamal system:
w and z comprise the signature.
It is required for B3 class systems to protect against both covert storage
and covert timing channels.

D.
It can perform encryption.
The private key is x and the public key is y, g, and p.
To encrypt a message, M, in the ElGamal system:
Verification of the signature is accomplished if g M mod p = y w w z
mod p.
QUESTION 1649
Which is NOT true about Covert Channel Analysis?
It is required for B2 class systems to protect against covert timing channels.

A.
It is based on the discrete logarithm problem.
Choose a prime number, p.
Select a random number, j, such that j is relatively prime to p-1.
Recall that two numbers are relatively prime if they have no
common factors other than 1.
Select a random number, j, such that j is relatively prime to p-1. The
value of j must not be disclosed. Generate w = g j mod p.
It is required for B2 class systems in order to protect against covert
storage channels.

B.
It can be used to generate digital signatures.
Choose two random numbers, g and x (g and x must both be less
than p).
Generate w = g j mod p and z = y j M mod p.
Solve for z in the equation M = (xw + jz) mod (p-1). The solution to
this equation is beyond the scope of this coverage. Suffice to say that
an algorithm exists to solve for the variable z.
It is an operational assurance requirement that is specified in the
Orange Book.

C.
It can perform encryption, but not digital signatures.
Calculate y = g x mod p.
w and z comprise the ciphertext.
To decrypt the message, M, in the ElGamal system, calculate M =
z/w xmod p. This can be shown by substituting the values of z and w
in the equation as follows:
M = y j M mod p/ g jx mod p
Since y j = g xj mod p
M = (g xj M / g jx ) mod p
To sign a message, M, in the ElGamal system:
w and z comprise the signature.
It is required for B3 class systems to protect against both covert storage
and covert timing channels.

D.
It can perform encryption.
The private key is x and the public key is y, g, and p.
To encrypt a message, M, in the ElGamal system:
Verification of the signature is accomplished if g M mod p = y w w z
mod p.
QUESTION 1649
Which is NOT true about Covert Channel Analysis?
It is required for B2 class systems to protect against covert timing channels.

A.
It is based on the discrete logarithm problem.
Choose a prime number, p.
Select a random number, j, such that j is relatively prime to p-1.
Recall that two numbers are relatively prime if they have no
common factors other than 1.
Select a random number, j, such that j is relatively prime to p-1. The
value of j must not be disclosed. Generate w = g j mod p.
It is required for B2 class systems in order to protect against covert
storage channels.

B.
It can be used to generate digital signatures.
Choose two random numbers, g and x (g and x must both be less
than p).
Generate w = g j mod p and z = y j M mod p.
Solve for z in the equation M = (xw + jz) mod (p-1). The solution to
this equation is beyond the scope of this coverage. Suffice to say that
an algorithm exists to solve for the variable z.
It is an operational assurance requirement that is specified in the
Orange Book.

C.
It can perform encryption, but not digital signatures.
Calculate y = g x mod p.
w and z comprise the ciphertext.
To decrypt the message, M, in the ElGamal system, calculate M =
z/w xmod p. This can be shown by substituting the values of z and w
in the equation as follows:
M = y j M mod p/ g jx mod p
Since y j = g xj mod p
M = (g xj M / g jx ) mod p
To sign a message, M, in the ElGamal system:
w and z comprise the signature.
It is required for B3 class systems to protect against both covert storage
and covert timing channels.

A.
It is based on the discrete logarithm problem.
Choose a prime number, p.
Select a random number, j, such that j is relatively prime to p-1.
Recall that two numbers are relatively prime if they have no
common factors other than 1.
Select a random number, j, such that j is relatively prime to p-1. The
value of j must not be disclosed. Generate w = g j mod p.
It is required for B2 class systems in order to protect against covert
storage channels.

B.
It can be used to generate digital signatures.
Choose two random numbers, g and x (g and x must both be less
than p).
Generate w = g j mod p and z = y j M mod p.
Solve for z in the equation M = (xw + jz) mod (p-1). The solution to
this equation is beyond the scope of this coverage. Suffice to say that
an algorithm exists to solve for the variable z.
It is an operational assurance requirement that is specified in the
Orange Book.

C.
It can perform encryption, but not digital signatures.
Calculate y = g x mod p.
w and z comprise the ciphertext.
To decrypt the message, M, in the ElGamal system, calculate M =
z/w xmod p. This can be shown by substituting the values of z and w
in the equation as follows:
M = y j M mod p/ g jx mod p
Since y j = g xj mod p
M = (g xj M / g jx ) mod p
To sign a message, M, in the ElGamal system:
w and z comprise the signature.
It is required for B3 class systems to protect against both covert storage
and covert timing channels.

D.
It can perform encryption.
The private key is x and the public key is y, g, and p.
To encrypt a message, M, in the ElGamal system:
Verification of the signature is accomplished if g M mod p = y w w z
mod p.
QUESTION 1649
Which is NOT true about Covert Channel Analysis?
It is required for B2 class systems to protect against covert timing channels.

A.
It is based on the discrete logarithm problem.
Choose a prime number, p.
Select a random number, j, such that j is relatively prime to p-1.
Recall that two numbers are relatively prime if they have no
common factors other than 1.
Select a random number, j, such that j is relatively prime to p-1. The
value of j must not be disclosed. Generate w = g j mod p.
It is required for B2 class systems in order to protect against covert
storage channels.

B.
It can be used to generate digital signatures.
Choose two random numbers, g and x (g and x must both be less
than p).
Generate w = g j mod p and z = y j M mod p.
Solve for z in the equation M = (xw + jz) mod (p-1). The solution to
this equation is beyond the scope of this coverage. Suffice to say that
an algorithm exists to solve for the variable z.
It is an operational assurance requirement that is specified in the
Orange Book.

C.
It can perform encryption, but not digital signatures.
Calculate y = g x mod p.
w and z comprise the ciphertext.
To decrypt the message, M, in the ElGamal system, calculate M =
z/w xmod p. This can be shown by substituting the values of z and w
in the equation as follows:
M = y j M mod p/ g jx mod p
Since y j = g xj mod p
M = (g xj M / g jx ) mod p
To sign a message, M, in the ElGamal system:
w and z comprise the signature.
It is required for B3 class systems to protect against both covert storage
and covert timing channels.

D.
It can perform encryption.
The private key is x and the public key is y, g, and p.
To encrypt a message, M, in the ElGamal system:
Verification of the signature is accomplished if g M mod p = y w w z
mod p.
QUESTION 1649
Which is NOT true about Covert Channel Analysis?
It is required for B2 class systems to protect against covert timing channels.

Explanation:
The ElGamal public key cryptosystem can perform both encryption
and digital signatures based on the discrete logarithm problem.
These three characteristics are shown in the examples that follow.
To generate a key pair in the ElGamal system:

The correct answer is “It is required for B2 class systems to protect against covert timing
channels”. Orange Book B2 class systems do not need to be protected from covert timing
channels. Covert channel analysis must be performed for B2-level class systems to protect
against covert storage channels only. B3 class systems need to be protected against both covert
storage channels and covert timing channels.

2 Comments on “Which of the following is NOT a characteristic of the ElGamal public key cryptosystem?


Leave a Reply