Exam 9: Public-Key Cryptography and Rsa
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
A __________ is one that maps a domain into a range such that every function value has a unique inverse, with the condition that the calculation of the function is easy, whereas the calculation of the inverse is infeasible.
(Short Answer)
4.8/5
(35)
A trap-door one-way function is easy to calculate in one direction
and infeasible to calculate in the other direction unless certain
additional information is known.
(True/False)
4.9/5
(28)
A major advance in symmetric cryptography occurred with the
development of the rotor encryption/decryption machine.
(True/False)
4.9/5
(32)
the difficulty of attacking __________ is based on the difficulty of finding the prime factors of a composite number.
(Short Answer)
4.8/5
(39)
the readable message or data that is fed into the algorithm as input is the ____________ .
(Multiple Choice)
4.9/5
(27)
Asymmetric encryption transforms plaintext into __________ using one of two keys and an encryption algorithm.
(Short Answer)
4.8/5
(37)
the defense against the brute-force approach for RSA is to use a
large key space.
(True/False)
4.9/5
(39)
the encryption algorithm performs various transformation on the
ciphertext.
(True/False)
4.7/5
(41)
We define the ___________ of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps.this is a common measure of the efficiency of an algorithm.
(Multiple Choice)
4.8/5
(45)
Public-key encryption is more secure from cryptanalysis than
symmetric encryption.
(True/False)
4.8/5
(34)
Plaintext is recovered from the ciphertext using the paired key and _____________ .
(Multiple Choice)
4.8/5
(35)
Before the application of the public-key cryptosystem each
participant must generate a pair of keys.
(True/False)
4.8/5
(41)
the __________ indicates that the subscriber identified in the certificate has sole control and access to the private key.
(Multiple Choice)
4.8/5
(35)
Asymmetric algorithms rely on one key for encryption and a
different but related key for decryption.
(True/False)
4.8/5
(39)
Plaintext is transformed into ciphertext using two keys and a
decryption algorithm.
(True/False)
4.9/5
(42)
two issues to consider with the computation required to use RSA are encryption/decryption and __________ .
(Multiple Choice)
4.8/5
(32)
to counter attacks such as CCAs, RSA Security, Inc.
recommends modifying the plaintext using a procedure known as ___________ .
(Essay)
4.9/5
(41)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)