Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

FIT2093-L7-Public key cryptography

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
01-02-2024
Written in
2023/2024

FIT2093-L7-Public key cryptography __________ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification. Select one: a. Cipher keys b. Symmetric keys c. Key exchanges d. Asymmetric keys - ANSW d Asymmetric encryption can be used for __________ . Select one: a. neither confidentiality nor authentication b. authentication c. both confidentiality and authentication d. confidentiality - ANSW c If a secret key is to be used as a _________ for conventional encryption a single number must be generated. Select one: a. discrete logarithm b. primitive root c. prime curve d. session key - ANSW d Plaintext is recovered from the ciphertext using the paired key and a _____________ . Select one: a. recovery encryption b. decryption algorithm c. digital signature

Show more Read less
Institution
Course

Content preview

FIT2093-L7-Public key cryptography

A __________ is a cryptographic algorithm that uses two related keys, a public key and
a private key. The two keys have the property that deriving the private key from the
public key is computationally infeasible.

Select one:
a. RSA Digital Cryptographic Algorithm
b. Private Key (Symmetric) Cryptographic Algorithm
c. Public Key (Asymmetric) Cryptographic Algorithm
d. Key Exchange Cryptographic Algorithm - ANSW c

A public-key encryption scheme has __________ ingredients.

Select one:
a. six
b. two
c. eight
d. four - ANSW a

__________ are two related keys, a public key and a private key that are used to
perform complementary operations, such as encryption and decryption or signature
generation and signature verification.

Select one:
a. Cipher keys
b. Symmetric keys
c. Key exchanges
d. Asymmetric keys - ANSW d

Asymmetric encryption can be used for __________ .

Select one:
a. neither confidentiality nor authentication
b. authentication
c. both confidentiality and authentication
d. confidentiality - ANSW c

If a secret key is to be used as a _________ for conventional encryption a single
number must be generated.

Select one:

, a. discrete logarithm
b. primitive root
c. prime curve
d. session key - ANSW d

Plaintext is recovered from the ciphertext using the paired key and a _____________ .

Select one:
a. recovery encryption
b. decryption algorithm
c. digital signature
d. encryption algorithm - ANSW b

Public-key algorithms are based on __________ .

Select one:
a. mathematical functions
b. permutation
c. substitution
d. symmetry - ANSW a

Public-key encryption is also known as ___________ .

Select one:
a. asymmetric encryption Correct
b. optimal-key encryption
c. one way time exchange encryption
d. digital-key encryption - ANSW a

The __________ indicates that the subscriber identified in the certificate has sole
control and access to the private key.

Select one:
a. Digital Signature
b. PKI
c. OAEP
d. Public key certificate - ANSW d

The __________ key exchange involves multiplying pairs of nonzero integers modulo a
prime number q. Keys are generated by exponentiation over the group with
exponentiation defined as repeated multiplication.

Select one:
a. Diffie-Hellman
b. ElGamal
c. Rabin-Miller

Written for

Course

Document information

Uploaded on
February 1, 2024
Number of pages
12
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.29
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartchoices Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
36
Member since
5 year
Number of followers
5
Documents
4499
Last sold
3 weeks ago

4.8

9 reviews

5
7
4
2
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions