Public key cryptography
* Required
Email address
*
Your email
What security assumption does elliptic curve cryptography (ECC) depend on?
1 point
Euclidean geometry
The hardness of multiplying points on elliptic curves
The hardness of factoring
The hardness of discrete logarithms
Clear selection
How are Bitcoin addresses derived?
1 point
sha2(sha2(private_key))
ripemd160(sha2(public_key))
encrypt(public_key, private_key)
sha2(ripemd160(public_key))
Clear selection
Which of the following types of cryptocurrency wallets is generally the most secure?
1 point
Brain wallet
Hardware wallet
Web wallet
Bi-fold wallet
Clear selection
Is it a good idea to roll your own crypto?
1 point
Yes
Yup
Totally
Hell no
Clear selection
Why do cryptographic signatures sign the hash of the message instead of the message itself? (select multiple)
1 point
There can be security vulnerabilities in signing a raw message
It's a convention inherited from PGP
There are no known algorithms for signing long messages
Signing long messages is slow
Which of the following statements describes encryption?
1 point
Transformation of a message into an obfuscated format that can only be reversed using a secret key
Transformation of a message into a publicly decodable format
A one-way transformation of a message into a fixed-size output
The only way to efficiently scramble data
Clear selection
What is "asymmetric" about asymmetric cryptography?
1 point
No two keys are the same
The keys to encrypt and decrypt are different
The algorithms have arbitrary key sizes
The keys are palindromes
Clear selection
Submit
Page 1 of 1
This form was created inside of Nakamoto.
Report Abuse
Forms