The correct answer is C. Symmetric encryption because it is the most resource-efficient cryptographic method, using a single shared key for both encryption and decryption, which requires less processing power and is faster. While Elliptic Curve Cryptography (ECC) (answer D) is more efficient than traditional asymmetric methods like RSA, it still involves asymmetric encryption, which is generally more computationally intensive than symmetric encryption. Therefore, for systems with limited computing resources, symmetric encryption is the better choice.
From Study Guide:
The drawback of asymmetric encryption is that it involves substantial computing
overhead compared to symmetric encryption. Where a large amount of data is
being encrypted on disk or transported over a network, asymmetric encryption is
inefficient. Rather than being used to encrypt the bulk data directly, the public key
cipher can be used to encrypt a symmetric secret key.
The Elliptic Curve Cryptography (ECC) asymmetric cipher can use 256-bit
private keys to achieve a level of security equivalent to a 3,072-bit RSA key.
I think the technical correct answer is D, but exam correct answer is C.
The preferred cryptographic method for securing communications with limited computing resources is D. Elliptic curve cryptography (ECC). ECC provides strong security with smaller key sizes, making it efficient for devices with limited processing power and memory.
AI Generated Answer
When securing communications with limited computing resources, Elliptic Curve Cryptography (ECC) is the preferred cryptographic method due to its ability to provide strong security with significantly smaller key sizes, making it ideal for devices with limited processing power and memory, like IoT devices and mobile phones.
Key points about ECC:
Efficiency:
Compared to traditional methods like RSA, ECC requires much less computational power to achieve the same level of security, making it suitable for resource-constrained environments.
Smaller Key Lengths:
ECC can achieve strong encryption with significantly shorter key lengths compared to other algorithms, which translates to less storage space needed.
Widely Adopted:
ECC is standardized by various organizations and is widely used in modern cryptographic applications, including digital signatures and key exchange.
The correct answer is:
D. Elliptic curve cryptography
Explanation:
Elliptic curve cryptography (ECC) is preferred for securing communications with limited computing resources because it offers strong security with relatively small key sizes compared to other cryptographic methods like RSA. This makes it particularly suitable for devices with constrained resources such as mobile phones, IoT devices, or embedded systems. ECC provides efficient performance in terms of computation, memory usage, and bandwidth, making it an ideal choice for resource-limited environments.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
geitenwollenSOC
Highly Voted 4 months, 1 week agochasingsummer
Highly Voted 4 months, 1 week agoLafras23
Most Recent 1 week agoagp2684
2 months ago135d263
2 months, 1 week agojbmac
3 months ago