Exam 9: Public-Key Cryptography and Rsa

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

__________ are two related keys,a public key and a private key that are used to perform complementary operations,such as encryption and decryption or signature generation and signature verification.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

A

Asymmetric encryption can be used for confidentiality but not for authentication.

Free
(True/False)
4.8/5
(32)
Correct Answer:
Verified

False

Public-key encryption is more secure from cryptanalysis than symmetric encryption.

Free
(True/False)
4.8/5
(44)
Correct Answer:
Verified

False

A single algorithm that will calculate the greatest common divisor gcd)of two integers and,if the gcd is 1,determine the inverse of one of the integers modulo the other,is the __________ algorithm.

(Essay)
4.8/5
(33)

Timing attacks are ciphertext attacks that are only applicable to RSA.

(True/False)
4.9/5
(28)

Asymmetric encryption is also known as ___________ .

(Multiple Choice)
4.9/5
(35)

To counter attacks such as CCAs,RSA Security,Inc. recommends modifying the plaintext using a procedure known as ___________ .

(Essay)
4.7/5
(34)

Before the application of the public-key cryptosystem each participant must generate a pair of keys.

(True/False)
4.8/5
(35)

A major advance in symmetric cryptography occurred with the development of the rotor encryption/decryption machine.

(True/False)
4.8/5
(38)

Asymmetric encryption transforms plaintext into __________ using one of two keys and an encryption algorithm.

(Essay)
4.9/5
(40)

The __________ indicates that the subscriber identified in the certificate has sole control and access to the private key.

(Multiple Choice)
4.9/5
(30)

Asymmetric encryption transforms plaintext into ciphertext.

(True/False)
4.9/5
(35)

The key used in symmetric encryption is referred to as a __________ key.

(Multiple Choice)
4.8/5
(34)

A __________ is a digital document issued and digitally signed by the private key of a Certification Authority that binds the name of a subscriber to a public key.

(Essay)
4.8/5
(27)

"The sender 'signs' a message with its private key.Signing is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message," is a description of a ___________ .

(Essay)
4.8/5
(29)

We define the ___________ of an algorithm to be fn)if,for all n and all inputs of length n the execution of the algorithm takes at most fn)steps.This is a common measure of the efficiency of an algorithm.

(Multiple Choice)
4.8/5
(36)

The __________ scheme is a block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n.

(Essay)
4.9/5
(38)

Four possible approaches to attacking the RSA algorithm are: brute force,mathematical attacks,chosen ciphertext attacks,and ___________ .

(Essay)
4.8/5
(39)

Much of the theory of public-key cryptosystems is based on number theory.

(True/False)
4.8/5
(38)

A __________ is an attack in which the adversary chooses a number of ciphertexts and is then given the corresponding plaintexts,decrypted with the target's private key.

(Essay)
4.9/5
(37)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)