Exam 9: Public-Key Cryptography and Rsa
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
__________ are two related keys,a public key and a private key that are used to perform complementary operations,such as encryption and decryption or signature generation and signature verification.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
A
Asymmetric encryption can be used for confidentiality but not for authentication.
Free
(True/False)
4.8/5
(32)
Correct Answer:
False
Public-key encryption is more secure from cryptanalysis than symmetric encryption.
Free
(True/False)
4.8/5
(44)
Correct Answer:
False
A single algorithm that will calculate the greatest common divisor gcd)of two integers and,if the gcd is 1,determine the inverse of one of the integers modulo the other,is the __________ algorithm.
(Essay)
4.8/5
(33)
Timing attacks are ciphertext attacks that are only applicable to RSA.
(True/False)
4.9/5
(28)
To counter attacks such as CCAs,RSA Security,Inc. recommends modifying the plaintext using a procedure known as ___________ .
(Essay)
4.7/5
(34)
Before the application of the public-key cryptosystem each participant must generate a pair of keys.
(True/False)
4.8/5
(35)
A major advance in symmetric cryptography occurred with the development of the rotor encryption/decryption machine.
(True/False)
4.8/5
(38)
Asymmetric encryption transforms plaintext into __________ using one of two keys and an encryption algorithm.
(Essay)
4.9/5
(40)
The __________ indicates that the subscriber identified in the certificate has sole control and access to the private key.
(Multiple Choice)
4.9/5
(30)
The key used in symmetric encryption is referred to as a __________ key.
(Multiple Choice)
4.8/5
(34)
A __________ is a digital document issued and digitally signed by the private key of a Certification Authority that binds the name of a subscriber to a public key.
(Essay)
4.8/5
(27)
"The sender 'signs' a message with its private key.Signing is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message," is a description of a ___________ .
(Essay)
4.8/5
(29)
We define the ___________ of an algorithm to be fn)if,for all n and all inputs of length n the execution of the algorithm takes at most fn)steps.This is a common measure of the efficiency of an algorithm.
(Multiple Choice)
4.8/5
(36)
The __________ scheme is a block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n.
(Essay)
4.9/5
(38)
Four possible approaches to attacking the RSA algorithm are: brute force,mathematical attacks,chosen ciphertext attacks,and ___________ .
(Essay)
4.8/5
(39)
Much of the theory of public-key cryptosystems is based on number theory.
(True/False)
4.8/5
(38)
A __________ is an attack in which the adversary chooses a number of ciphertexts and is then given the corresponding plaintexts,decrypted with the target's private key.
(Essay)
4.9/5
(37)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)