Question

Lenstra’s method is an effective subexponential algorithm with applications in this field and involves computing points on an elliptic curve over a finite field. (10[2])Diffie and Hellman name a protocol in this field that is used to perform “exchanges” over a channel. (10[1])This field relies on “hardness” assumptions such as the discrete logarithm problem. So-called “primitives” like the hash SHA-1 are used (10[1])as the basis for systems in (10[1])this field. A public key and a private key (10[1])are used (10[4])in an algorithm in this (10[1])field that relies on the difficulty of factoring large numbers, the RSA algorithm. For 10 points, name this branch of computer science that develops (10[1])secure communication methods. ■END■

ANSWER: cryptography [or cryptology; accept encryption or RSA encryption; accept elliptic curve cryptography or public-key cryptography; prompt on cybersecurity or mathematics or number theory; prompt on computer science or CS until read]
<Other Science>
= Average correct buzz position

Back to tossups

Summary

2024 ACF Fall at CornellfallY10100%0%20%69.10
2024 ACF Fall at Ohio StatefallY8100%0%0%55.13
2024 ACF Fall at WashingtonfallY1100%0%0%23.00
2024 ACF Fall at GeorgiafallY12100%0%0%66.08
2024 ACF Fall at North CarolinafallY9100%0%11%76.11
2024 ACF Fall at Claremont CollegesfallY5100%0%0%44.80
2024 ACF Fall at RutgersfallY8100%0%0%47.75
2024 ACF Fall at IllinoisfallY9100%0%11%59.44

Buzzes

PlayerTeamOpponentBuzz PositionValue
Parker McCoigTennessee AAlabama A2310
Daniel ChenEmory OxfordTennessee B2310
Jeffery XuGeorgia Tech DVanderbilt A4110
Aaron TaylorMississippi State AAuburn C6110
Ryon PeddapalliClemson BBelmont6710
Ishaan KashyapGeorgia Tech CEmory A7610
Kabir ZamanSouth Carolina AAuburn A7810
Kabir ZamanSouth Carolina AAuburn A7810
Monish JampalaGeorgia Tech BClemson A7810
John McqueenSouth Carolina BVanderbilt B7810
Rafeed Rahman TurjyaGeorgia AFurman8310
TJ PickeringAuburn BSouthern10710