Exam 9: Public-Key Cryptography and Rsa
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
The most widely used public-key cryptosystem is __________ .
(Multiple Choice)
4.8/5
(43)
A public-key encryption scheme is not vulnerable to a brute-force attack.
(True/False)
4.7/5
(34)
The readable message or data that is fed into the algorithm as input is the ____________ .
(Multiple Choice)
4.8/5
(40)
Plaintext is transformed into ciphertext using two keys and a decryption algorithm.
(True/False)
4.8/5
(35)
A __________ is a cryptographic algorithm that uses two related keys,a public key and a private key.The two keys have the property that deriving the private key from the public key is computationally infeasible.
(Multiple Choice)
4.8/5
(31)
The scrambled message produced as output is the __________ .It depends on the plaintext and the key.
(Essay)
4.8/5
(38)
Two issues to consider with the computation required to use RSA are encryption/decryption and __________ .
(Multiple Choice)
4.8/5
(27)
Plaintext is recovered from the ciphertext using the paired key and a _____________ .
(Multiple Choice)
4.9/5
(34)
Asymmetric algorithms rely on one key for encryption and a different but related key for decryption.
(True/False)
4.9/5
(39)
Asymmetric encryption utilizes only a public key for encryption and decryption.
(True/False)
4.8/5
(26)
A trap-door one-way function is easy to calculate in one direction and infeasible to calculate in the other direction unless certain additional information is known.
(True/False)
4.8/5
(36)
The __________ is a set of policies,processes,server platforms,software and workstations used for the purpose of administering certificates and public-private key pairs,including the ability to issue,maintain,and revoke public key certificates.
(Essay)
4.8/5
(26)
__________ depend on the running time of the decryption algorithm.
(Multiple Choice)
4.7/5
(37)
Public-key cryptography is asymmetric,involving the use of two separate keys,in contrast to ___________ encryption,which uses only one key.
(Essay)
4.9/5
(37)
__________ encryption is a form of cryptosystem in which encryption and decryption are performed using a public key and a private key.
(Essay)
4.7/5
(28)
A __________ is one that maps a domain into a range such that every function value has a unique inverse,with the condition that the calculation of the function is easy,whereas the calculation of the inverse is infeasible.
(Essay)
4.8/5
(35)
The difficulty of attacking __________ is based on the difficulty of finding the prime factors of a composite number.
(Essay)
4.8/5
(23)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)