Exam 9: Public-Key Cryptography and Rsa

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A __________ is one that maps a domain into a range such that every function value has a unique inverse, with the condition that the calculation of the function is easy, whereas the calculation of the inverse is infeasible.

(Short Answer)
4.8/5
(35)

A trap-door one-way function is easy to calculate in one direction and infeasible to calculate in the other direction unless certain additional information is known.

(True/False)
4.9/5
(28)

A major advance in symmetric cryptography occurred with the development of the rotor encryption/decryption machine.

(True/False)
4.9/5
(32)

the difficulty of attacking __________ is based on the difficulty of finding the prime factors of a composite number.

(Short Answer)
4.8/5
(39)

the readable message or data that is fed into the algorithm as input is the ____________ .

(Multiple Choice)
4.9/5
(27)

Asymmetric encryption transforms plaintext into __________ using one of two keys and an encryption algorithm.

(Short Answer)
4.8/5
(37)

the defense against the brute-force approach for RSA is to use a large key space.

(True/False)
4.9/5
(39)

A public-key encryption scheme has __________ ingredients.

(Multiple Choice)
4.9/5
(48)

the encryption algorithm performs various transformation on the ciphertext.

(True/False)
4.7/5
(41)

We define the ___________ of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps.this is a common measure of the efficiency of an algorithm.

(Multiple Choice)
4.8/5
(45)

Public-key encryption is more secure from cryptanalysis than symmetric encryption.

(True/False)
4.8/5
(34)

Plaintext is recovered from the ciphertext using the paired key and _____________ .

(Multiple Choice)
4.8/5
(35)

Asymmetric encryption is also known as ___________ .

(Multiple Choice)
5.0/5
(29)

Before the application of the public-key cryptosystem each participant must generate a pair of keys.

(True/False)
4.8/5
(41)

Asymmetric encryption can be used for __________ .

(Multiple Choice)
4.8/5
(28)

the __________ indicates that the subscriber identified in the certificate has sole control and access to the private key.

(Multiple Choice)
4.8/5
(35)

Asymmetric algorithms rely on one key for encryption and a different but related key for decryption.

(True/False)
4.8/5
(39)

Plaintext is transformed into ciphertext using two keys and a decryption algorithm.

(True/False)
4.9/5
(42)

two issues to consider with the computation required to use RSA are encryption/decryption and __________ .

(Multiple Choice)
4.8/5
(32)

to counter attacks such as CCAs, RSA Security, Inc. recommends modifying the plaintext using a procedure known as ___________ .

(Essay)
4.9/5
(41)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)