A __________ is a cryptographic algorithm that uses two related keys, a public key and
a private key. The two keys have the property that deriving the private key from the
public key is computationally infeasible.
Select one:
a. RSA Digital Cryptographic Algorithm
b. Private Key (Symmetric) Cryptographic Algorithm
c. Public Key (Asymmetric) Cryptographic Algorithm
d. Key Exchange Cryptographic Algorithm - ANSW c
A public-key encryption scheme has __________ ingredients.
Select one:
a. six
b. two
c. eight
d. four - ANSW a
__________ are two related keys, a public key and a private key that are used to
perform complementary operations, such as encryption and decryption or signature
generation and signature verification.
Select one:
a. Cipher keys
b. Symmetric keys
c. Key exchanges
d. Asymmetric keys - ANSW d
Asymmetric encryption can be used for __________ .
Select one:
a. neither confidentiality nor authentication
b. authentication
c. both confidentiality and authentication
d. confidentiality - ANSW c
If a secret key is to be used as a _________ for conventional encryption a single
number must be generated.
Select one:
, a. discrete logarithm
b. primitive root
c. prime curve
d. session key - ANSW d
Plaintext is recovered from the ciphertext using the paired key and a _____________ .
Select one:
a. recovery encryption
b. decryption algorithm
c. digital signature
d. encryption algorithm - ANSW b
Public-key algorithms are based on __________ .
Select one:
a. mathematical functions
b. permutation
c. substitution
d. symmetry - ANSW a
Public-key encryption is also known as ___________ .
Select one:
a. asymmetric encryption Correct
b. optimal-key encryption
c. one way time exchange encryption
d. digital-key encryption - ANSW a
The __________ indicates that the subscriber identified in the certificate has sole
control and access to the private key.
Select one:
a. Digital Signature
b. PKI
c. OAEP
d. Public key certificate - ANSW d
The __________ key exchange involves multiplying pairs of nonzero integers modulo a
prime number q. Keys are generated by exponentiation over the group with
exponentiation defined as repeated multiplication.
Select one:
a. Diffie-Hellman
b. ElGamal
c. Rabin-Miller