Deck 9: Public-Key Cryptography and Rsa

Full screen (f)
exit full mode
Question
Much of the theory of public-key cryptosystems is based on
number theory.
Use Space or
up arrow
down arrow
to flip the card.
Question
Plaintext is recovered from the ciphertext using the paired key and _____________ .

A)a digital signature
B)a recovery encryption
C)a decryption algorithm
D)an encryption algorithm
Question
A major advance in symmetric cryptography occurred with the
development of the rotor encryption/decryption machine.
Question
Asymmetric algorithms rely on one key for encryption and a
different but related key for decryption.
Question
Public-key encryption is also known as ___________ .

A)digital-key encryption
B)asymmetric encryption
C)one-way time-exchange encryption
D)optimal-key encryption
Question
Asymmetric encryption can be used for confidentiality but not for
authentication.
Question
Asymmetric encryption utilizes only a public key for encryption
and decryption.
Question
A public-key encryption scheme is not vulnerable to a brute-force
attack.
Question
A trap-door one-way function is easy to calculate in one direction
and infeasible to calculate in the other direction unless certain
additional information is known.
Question
Public-key encryption is more secure from cryptanalysis than
symmetric encryption.
Question
Asymmetric encryption can be used for __________ .

A)both confidentiality and authentication
B)neither confidentiality nor authentication
C)confidentiality
D)authentication
Question
Before the application of the public-key cryptosystem each
participant must generate a pair of keys.
Question
the most widely used public-key cryptosystem is __________ .

A)optimal asymmetric encryption
B)asymmetric encryption
C)RSA
D)DES
Question
the encryption algorithm performs various transformation on the
ciphertext.
Question
timing attacks are ciphertext attacks that are only applicable to
RS
Question
the defense against the brute-force approach for RSA is to use a
large key space.
Question
Plaintext is transformed into ciphertext using two keys and a
decryption algorithm.
Question
If the authenticator is encrypted with the sender's private key, it
serves as a signature that verifies origin, content, and sequencing.
Question
Asymmetric encryption transforms plaintext into ciphertext.
Question
Asymmetric encryption is also known as ___________ .

A)public-key encryption
B)private-key encryption
C)optimal-key encryption
D)digital-key encryption
Question
Public-key algorithms are based on __________ .

A)permutation
B)mathematical functions
C)substitution
D)symmetry
Question
A __________ is one that maps a domain into a range such that every function value has a unique inverse, with the condition that the calculation of the function is easy, whereas the calculation of the inverse is infeasible.
Question
the __________ is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.
Question
"the sender 'signs' a message with its private key.Signing is
achieved by a cryptographic algorithm applied to the message
or to a small block of data that is a function of the message," is
a description of a ___________ .
Question
Asymmetric encryption transforms plaintext into __________ using one of two keys and an encryption algorithm.
Question
the scrambled message produced as output is the __________ .It depends on the plaintext and the key.
Question
A __________ is a digital document issued and digitally signed by the private key of a Certification Authority that binds the name of a subscriber to a public key.
Question
two issues to consider with the computation required to use RSA are encryption/decryption and __________ .

A)time complexity
B)trap-door one-way functions
C)key generation
D)asymmetric encryption padding
Question
the readable message or data that is fed into the algorithm as input is the ____________ .

A)ciphertext
B)exchange
C)plaintext
D)encryption
Question
A __________ is when two sides cooperate to exchange a session key.
Question
the key used in symmetric encryption is referred to as a __________ key.

A)public
B)secret
C)private
D)decryption
Question
A __________ is a cryptographic algorithm that uses two related keys, a public key and a private key.the two keys have the property that deriving the private key from the public key is computationally infeasible.

A)Private Key (Symmetric) Cryptographic Algorithm
B)Key Exchange Cryptographic Algorithm
C)Public Key (Asymmetric) Cryptographic Algorithm
D)RSA Digital Cryptographic Algorithm
Question
Public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to ___________ encryption, which uses only one key.
Question
__________ encryption is a form of cryptosystem in which encryption and decryption are performed using a public key and a private key.
Question
__________ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.

A)Asymmetric keys
B)Key exchanges
C)Symmetric keys
D)Cipher keys
Question
We define the ___________ of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps.this is a common measure of the efficiency of an algorithm.

A)time complexity
B)one-way function
C)timing attack
D)OAEP
Question
__________ depend on the running time of the decryption algorithm.

A)Mathematical attacks
B)timing attacks
C)Chosen ciphertext attacks
D)Brute-force attacks
Question
the difficulty of attacking __________ is based on the difficulty of finding the prime factors of a composite number.
Question
A public-key encryption scheme has __________ ingredients.

A)six
B)four
C)eight
D)two
Question
the __________ indicates that the subscriber identified in the certificate has sole control and access to the private key.

A)OAEP
B)Public Key Certificate
C)Digital Signature
D)PKI
Question
Five possible approaches to attacking the RSA algorithm are:
brute force, mathematical attacks, hardware fault-based attack, chosen ciphertext attacks, and ___________ .
Question
A __________ is an attack in which the adversary chooses a
number of ciphertexts and is then given the corresponding plaintexts, decrypted with the target's private key.
Question
to counter attacks such as CCAs, RSA Security, Inc.
recommends modifying the plaintext using a procedure known as ___________ .
Question
A single algorithm that will calculate the greatest common
divisor (gcd) of two integers and, if the gcd is 1, determine the inverse of one of the integers modulo the other, is the __________ algorithm.
Question
the __________ scheme is a block cipher in which the plaintext
and ciphertext are integers between 0 and n - 1 for some n.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 9: Public-Key Cryptography and Rsa
1
Much of the theory of public-key cryptosystems is based on
number theory.
True
2
Plaintext is recovered from the ciphertext using the paired key and _____________ .

A)a digital signature
B)a recovery encryption
C)a decryption algorithm
D)an encryption algorithm
C
3
A major advance in symmetric cryptography occurred with the
development of the rotor encryption/decryption machine.
True
4
Asymmetric algorithms rely on one key for encryption and a
different but related key for decryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Public-key encryption is also known as ___________ .

A)digital-key encryption
B)asymmetric encryption
C)one-way time-exchange encryption
D)optimal-key encryption
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Asymmetric encryption can be used for confidentiality but not for
authentication.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Asymmetric encryption utilizes only a public key for encryption
and decryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
A public-key encryption scheme is not vulnerable to a brute-force
attack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
A trap-door one-way function is easy to calculate in one direction
and infeasible to calculate in the other direction unless certain
additional information is known.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
Public-key encryption is more secure from cryptanalysis than
symmetric encryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Asymmetric encryption can be used for __________ .

A)both confidentiality and authentication
B)neither confidentiality nor authentication
C)confidentiality
D)authentication
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
Before the application of the public-key cryptosystem each
participant must generate a pair of keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
the most widely used public-key cryptosystem is __________ .

A)optimal asymmetric encryption
B)asymmetric encryption
C)RSA
D)DES
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
the encryption algorithm performs various transformation on the
ciphertext.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
timing attacks are ciphertext attacks that are only applicable to
RS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
the defense against the brute-force approach for RSA is to use a
large key space.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
Plaintext is transformed into ciphertext using two keys and a
decryption algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
If the authenticator is encrypted with the sender's private key, it
serves as a signature that verifies origin, content, and sequencing.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Asymmetric encryption transforms plaintext into ciphertext.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Asymmetric encryption is also known as ___________ .

A)public-key encryption
B)private-key encryption
C)optimal-key encryption
D)digital-key encryption
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
Public-key algorithms are based on __________ .

A)permutation
B)mathematical functions
C)substitution
D)symmetry
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A __________ is one that maps a domain into a range such that every function value has a unique inverse, with the condition that the calculation of the function is easy, whereas the calculation of the inverse is infeasible.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
the __________ is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
"the sender 'signs' a message with its private key.Signing is
achieved by a cryptographic algorithm applied to the message
or to a small block of data that is a function of the message," is
a description of a ___________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
Asymmetric encryption transforms plaintext into __________ using one of two keys and an encryption algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
the scrambled message produced as output is the __________ .It depends on the plaintext and the key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
A __________ is a digital document issued and digitally signed by the private key of a Certification Authority that binds the name of a subscriber to a public key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
two issues to consider with the computation required to use RSA are encryption/decryption and __________ .

A)time complexity
B)trap-door one-way functions
C)key generation
D)asymmetric encryption padding
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
the readable message or data that is fed into the algorithm as input is the ____________ .

A)ciphertext
B)exchange
C)plaintext
D)encryption
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
A __________ is when two sides cooperate to exchange a session key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
the key used in symmetric encryption is referred to as a __________ key.

A)public
B)secret
C)private
D)decryption
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
A __________ is a cryptographic algorithm that uses two related keys, a public key and a private key.the two keys have the property that deriving the private key from the public key is computationally infeasible.

A)Private Key (Symmetric) Cryptographic Algorithm
B)Key Exchange Cryptographic Algorithm
C)Public Key (Asymmetric) Cryptographic Algorithm
D)RSA Digital Cryptographic Algorithm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
Public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to ___________ encryption, which uses only one key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
__________ encryption is a form of cryptosystem in which encryption and decryption are performed using a public key and a private key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
__________ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.

A)Asymmetric keys
B)Key exchanges
C)Symmetric keys
D)Cipher keys
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
We define the ___________ of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps.this is a common measure of the efficiency of an algorithm.

A)time complexity
B)one-way function
C)timing attack
D)OAEP
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
__________ depend on the running time of the decryption algorithm.

A)Mathematical attacks
B)timing attacks
C)Chosen ciphertext attacks
D)Brute-force attacks
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
the difficulty of attacking __________ is based on the difficulty of finding the prime factors of a composite number.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A public-key encryption scheme has __________ ingredients.

A)six
B)four
C)eight
D)two
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
the __________ indicates that the subscriber identified in the certificate has sole control and access to the private key.

A)OAEP
B)Public Key Certificate
C)Digital Signature
D)PKI
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
Five possible approaches to attacking the RSA algorithm are:
brute force, mathematical attacks, hardware fault-based attack, chosen ciphertext attacks, and ___________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A __________ is an attack in which the adversary chooses a
number of ciphertexts and is then given the corresponding plaintexts, decrypted with the target's private key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
to counter attacks such as CCAs, RSA Security, Inc.
recommends modifying the plaintext using a procedure known as ___________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
A single algorithm that will calculate the greatest common
divisor (gcd) of two integers and, if the gcd is 1, determine the inverse of one of the integers modulo the other, is the __________ algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
the __________ scheme is a block cipher in which the plaintext
and ciphertext are integers between 0 and n - 1 for some n.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.