Exam 9: Public-Key Cryptography and Rsa

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The most widely used public-key cryptosystem is __________ .

(Multiple Choice)
4.8/5
(43)

A public-key encryption scheme is not vulnerable to a brute-force attack.

(True/False)
4.7/5
(34)

The readable message or data that is fed into the algorithm as input is the ____________ .

(Multiple Choice)
4.8/5
(40)

Plaintext is transformed into ciphertext using two keys and a decryption algorithm.

(True/False)
4.8/5
(35)

A __________ is a cryptographic algorithm that uses two related keys,a public key and a private key.The two keys have the property that deriving the private key from the public key is computationally infeasible.

(Multiple Choice)
4.8/5
(31)

A public-key encryption scheme has __________ ingredients.

(Multiple Choice)
4.8/5
(39)

The scrambled message produced as output is the __________ .It depends on the plaintext and the key.

(Essay)
4.8/5
(38)

Public-key algorithms are based on __________ .

(Multiple Choice)
4.8/5
(29)

Two issues to consider with the computation required to use RSA are encryption/decryption and __________ .

(Multiple Choice)
4.8/5
(27)

Plaintext is recovered from the ciphertext using the paired key and a _____________ .

(Multiple Choice)
4.9/5
(34)

Asymmetric algorithms rely on one key for encryption and a different but related key for decryption.

(True/False)
4.9/5
(39)

Asymmetric encryption utilizes only a public key for encryption and decryption.

(True/False)
4.8/5
(26)

A trap-door one-way function is easy to calculate in one direction and infeasible to calculate in the other direction unless certain additional information is known.

(True/False)
4.8/5
(36)

The __________ is a set of policies,processes,server platforms,software and workstations used for the purpose of administering certificates and public-private key pairs,including the ability to issue,maintain,and revoke public key certificates.

(Essay)
4.8/5
(26)

__________ depend on the running time of the decryption algorithm.

(Multiple Choice)
4.7/5
(37)

A __________ is when two sides cooperate to exchange a session key.

(Essay)
4.8/5
(31)

Public-key cryptography is asymmetric,involving the use of two separate keys,in contrast to ___________ encryption,which uses only one key.

(Essay)
4.9/5
(37)

__________ encryption is a form of cryptosystem in which encryption and decryption are performed using a public key and a private key.

(Essay)
4.7/5
(28)

A __________ is one that maps a domain into a range such that every function value has a unique inverse,with the condition that the calculation of the function is easy,whereas the calculation of the inverse is infeasible.

(Essay)
4.8/5
(35)

The difficulty of attacking __________ is based on the difficulty of finding the prime factors of a composite number.

(Essay)
4.8/5
(23)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)