Exam 9: Public-Key Cryptography and Rsa

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Asymmetric encryption transforms plaintext into ciphertext.

Free
(True/False)
4.9/5
(40)
Correct Answer:
Verified

True

A __________ is when two sides cooperate to exchange a session key.

Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Verified

key exchange

A __________ is a cryptographic algorithm that uses two related keys, a public key and a private key.the two keys have the property that deriving the private key from the public key is computationally infeasible.

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

C

If the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and sequencing.

(True/False)
4.7/5
(27)

A single algorithm that will calculate the greatest common divisor (gcd) of two integers and, if the gcd is 1, determine the inverse of one of the integers modulo the other, is the __________ algorithm.

(Short Answer)
4.8/5
(31)

Public-key algorithms are based on __________ .

(Multiple Choice)
4.8/5
(36)

Five possible approaches to attacking the RSA algorithm are: brute force, mathematical attacks, hardware fault-based attack, chosen ciphertext attacks, and ___________ .

(Short Answer)
4.7/5
(34)

the most widely used public-key cryptosystem is __________ .

(Multiple Choice)
4.8/5
(41)

the __________ scheme is a block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n.

(Short Answer)
4.8/5
(34)

the scrambled message produced as output is the __________ .It depends on the plaintext and the key.

(Short Answer)
4.7/5
(29)

A __________ is a digital document issued and digitally signed by the private key of a Certification Authority that binds the name of a subscriber to a public key.

(Short Answer)
4.8/5
(33)

the __________ is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.

(Short Answer)
4.9/5
(37)

Public-key encryption is also known as ___________ .

(Multiple Choice)
4.9/5
(41)

timing attacks are ciphertext attacks that are only applicable to RS

(True/False)
4.9/5
(29)

Asymmetric encryption can be used for confidentiality but not for authentication.

(True/False)
4.7/5
(41)

Asymmetric encryption utilizes only a public key for encryption and decryption.

(True/False)
4.9/5
(29)

the key used in symmetric encryption is referred to as a __________ key.

(Multiple Choice)
4.7/5
(34)

__________ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.

(Multiple Choice)
4.7/5
(31)

Much of the theory of public-key cryptosystems is based on number theory.

(True/False)
4.8/5
(36)

A public-key encryption scheme is not vulnerable to a brute-force attack.

(True/False)
4.8/5
(39)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)