Filters
Question type

Study Flashcards

__________ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.


A) Asymmetric keys
B) Key exchanges
C) Symmetric keys
D) Cipher keys

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

the __________ scheme is a block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n.

Correct Answer

verifed

verified

Asymmetric encryption utilizes only a public key for encryption and decryption.

A) True
B) False

Correct Answer

verifed

verified

Asymmetric encryption transforms plaintext into ciphertext.

A) True
B) False

Correct Answer

verifed

verified

True

Public-key algorithms are based on __________ .


A) permutation
B) mathematical functions
C) substitution
D) symmetry

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

the __________ is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.

Correct Answer

verifed

verified

Public Key...

View Answer

If the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and sequencing.

A) True
B) False

Correct Answer

verifed

verified

Public-key encryption is also known as ___________ .


A) digital-key encryption
B) asymmetric encryption
C) one-way time-exchange encryption
D) optimal-key encryption

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Five possible approaches to attacking the RSA algorithm are: brute force, mathematical attacks, hardware fault-based attack, chosen ciphertext attacks, and ___________ .

Correct Answer

verifed

verified

timing attacks are ciphertext attacks that are only applicable to RS

A) True
B) False

Correct Answer

verifed

verified

the key used in symmetric encryption is referred to as a __________ key.


A) public
B) secret
C) private
D) decryption

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

A __________ is a cryptographic algorithm that uses two related keys, a public key and a private key.the two keys have the property that deriving the private key from the public key is computationally infeasible.


A) Private Key (Symmetric) Cryptographic Algorithm
B) Key Exchange Cryptographic Algorithm
C) Public Key (Asymmetric) Cryptographic Algorithm
D) RSA Digital Cryptographic Algorithm

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

C

the most widely used public-key cryptosystem is __________ .


A) optimal asymmetric encryption
B) asymmetric encryption
C) RSA
D) DES

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A public-key encryption scheme is not vulnerable to a brute-force attack.

A) True
B) False

Correct Answer

verifed

verified

A __________ is a digital document issued and digitally signed by the private key of a Certification Authority that binds the name of a subscriber to a public key.

Correct Answer

verifed

verified

Public Key...

View Answer

Asymmetric encryption can be used for confidentiality but not for authentication.

A) True
B) False

Correct Answer

verifed

verified

the scrambled message produced as output is the __________ .It depends on the plaintext and the key.

Correct Answer

verifed

verified

A single algorithm that will calculate the greatest common divisor (gcd) of two integers and, if the gcd is 1, determine the inverse of one of the integers modulo the other, is the __________ algorithm.

Correct Answer

verifed

verified

Much of the theory of public-key cryptosystems is based on number theory.

A) True
B) False

Correct Answer

verifed

verified

A __________ is when two sides cooperate to exchange a session key.

Correct Answer

verifed

verified

key exchange

Showing 1 - 20 of 45

Related Exams

Show Answer