9.6 Asymmetric Encryption

¡Supera tus tareas y exámenes ahora con Quizwiz!

Implements the Diffie-Hellman key exchange protocol using elliptic curve cryptography.

ECDH

Which form of asymmetric cryptography is based upon Diffie-Hellman?

ElGamal

Exist only for the lifetime of a specific communication session.

Ephemeral keys

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature?

Mary's private key

Uses no deterministic algorithm when generating public keys

Perfect forward secrecy

Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

Private keys

Which of the following algorithms are used in asymmetric encryption? (select two)

RSA Diffie-Hellman

Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?

Sam's public key

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. Which of the following must the receiver use the access the hashing value and verify the integrity of the transmission?

Sender's public key

How many keys are used with asymmetric (public key) cryptography?

Two

ElGamel

An asymmetric encryption system based on a discrete logarithm problem.

Rivest Shamir Adleman (RSA)

An asymmetric encryption system based on factoring large numbers into their prime values.

Elliptic Curve Cryptography (ECC)

An asymmetric encryption system based on groups of numbers in an elliptical curve.

Merkle-Hellman Knapsack

An asymmetric encryption system based on the subset sum problem (given a list of numbers and a sum, determine the subset used to create the sum).

Asymmetric encryption

An encryption method that uses two mathematically related keys called a key pair.

Which of the following are characteristics of ECC? (select two)

Asymmetric encryption Uses a finite set of values within an algebraic field

Which of the following is used in conjunction with a local security authority to generate the private and public key pair used in asymmetric cryptography?

CSP

Which cryptography system generates encryption keys that could be used with DES, AES, IDEA, RC5 or any other symmetric cryptography solution?

Diffie-Hellman

Can be reused by multiple communication sessions.

Static keys

Diffie-Hellman key exchange

The first asymmetric algorithm developed by Whitfield Diffie and Martin Hellman in 1976 that generates symmetric keys simultaneously at sender and recipient sites over non-secure channels.

The success of asymmetric encryption is dependent upon which of the following?

The secrecy of the key


Conjuntos de estudio relacionados

Dental Assisting Radiology Unit 2

View Set

Astronomy Unit 7- Galaxies & Beyond

View Set

Renal & Urinary System histology

View Set

Introduction to World Religions Test 2

View Set

Chapter 17 (Special Senses) Practice questions, Chapter 17 study guide, Chapter 17 Diagram Questions, Chapter 17 Multiple Choice Questions, Chapter 17 Special Senses

View Set

Elastic and Inelastic Collisions;Physics Test; True and False

View Set

Inquizitive: Documenting Sources: MLA Style

View Set

HIST-H 101 Remembering Story Answers

View Set