Exam 9: Public-Key Cryptography and Rsa
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
Asymmetric encryption transforms plaintext into ciphertext.
Free
(True/False)
4.9/5
(40)
Correct Answer:
True
A __________ is when two sides cooperate to exchange a session key.
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
key exchange
A __________ is a cryptographic algorithm that uses two related keys, a public key and a private key.the two keys have the property that deriving the private key from the public key is computationally infeasible.
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
C
If the authenticator is encrypted with the sender's private key, it
serves as a signature that verifies origin, content, and sequencing.
(True/False)
4.7/5
(27)
A single algorithm that will calculate the greatest common
divisor (gcd) of two integers and, if the gcd is 1, determine the inverse of one of the integers modulo the other, is the __________ algorithm.
(Short Answer)
4.8/5
(31)
Five possible approaches to attacking the RSA algorithm are:
brute force, mathematical attacks, hardware fault-based attack, chosen ciphertext attacks, and ___________ .
(Short Answer)
4.7/5
(34)
the most widely used public-key cryptosystem is __________ .
(Multiple Choice)
4.8/5
(41)
the __________ scheme is a block cipher in which the plaintext
and ciphertext are integers between 0 and n - 1 for some n.
(Short Answer)
4.8/5
(34)
the scrambled message produced as output is the __________ .It depends on the plaintext and the key.
(Short Answer)
4.7/5
(29)
A __________ is a digital document issued and digitally signed by the private key of a Certification Authority that binds the name of a subscriber to a public key.
(Short Answer)
4.8/5
(33)
the __________ is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.
(Short Answer)
4.9/5
(37)
timing attacks are ciphertext attacks that are only applicable to
RS
(True/False)
4.9/5
(29)
Asymmetric encryption can be used for confidentiality but not for
authentication.
(True/False)
4.7/5
(41)
Asymmetric encryption utilizes only a public key for encryption
and decryption.
(True/False)
4.9/5
(29)
the key used in symmetric encryption is referred to as a __________ key.
(Multiple Choice)
4.7/5
(34)
__________ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.
(Multiple Choice)
4.7/5
(31)
Much of the theory of public-key cryptosystems is based on
number theory.
(True/False)
4.8/5
(36)
A public-key encryption scheme is not vulnerable to a brute-force
attack.
(True/False)
4.8/5
(39)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)