Public key cryptography
What security assumption does elliptic curve cryptography (ECC) depend on?
The hardness of multiplying points on elliptic curves
The hardness of factoring
The hardness of discrete logarithms
How are Bitcoin addresses derived?
Which of the following types of cryptocurrency wallets is generally the most secure?
Is it a good idea to roll your own crypto?
Why do cryptographic signatures sign the hash of the message instead of the message itself? (select multiple)
There can be security vulnerabilities in signing a raw message
It's a convention inherited from PGP
There are no known algorithms for signing long messages
Signing long messages is slow
Which of the following statements describes encryption?
Transformation of a message into an obfuscated format that can only be reversed using a secret key
Transformation of a message into a publicly decodable format
A one-way transformation of a message into a fixed-size output
The only way to efficiently scramble data
What is "asymmetric" about asymmetric cryptography?
No two keys are the same
The keys to encrypt and decrypt are different
The algorithms have arbitrary key sizes
The keys are palindromes
Page 1 of 1
This form was created inside of Nakamoto.