Sec 9.6 Asymmetric Encryption

¡Supera tus tareas y exámenes ahora con Quizwiz!

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature?

Mary's private key

Which cryptography system generates encryption keys that could be used with DES, AES, IDEA, RC5, or any other symmetric cryptography solution?

Diffie-Hellman is the only key generation system in this list of options. Diffie-Hellman produces a number that can be used as a key in any symmetric cryptography solution (assuming the number is within the algorithm's keyspace).

Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

Private keys

Which of the following is used in conjunction with a local security authority to generate the private and public key pair used in asymmetric cryptography?

A cryptographic service provider (CSP) resides on the client and generates the key pair. This is a software program that can generate keys using a specific algorithm.

Asymmetric Encryption

An encryption method that uses twomathematically related keys called a key pair.

Which form of asymmetric cryptography is based upon Diffie-Hellman?

El Gamal

Which of the following algorithms are used in asymmetric encryption? (Select two.)

Diffie-Hellman RSA

Match each public key cryptography key management mechanism on the left with the corresponding description on the right. Each mechanism may be used once, more than once, or not at all.

Implements the Diffie-Hellman key exchange protocol using elliptic curve cryptography-ECDH Exist only for the lifetime of a specific communication session-Ephemeral keys Uses no deterministic algorithm when generating public keys-Perfect forward secrecy Can be reused by multiple communication sessions-Static keys

Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?

Sam's public key

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission?

Sender's public key

The success of asymmetric encryption is dependent upon which of the following?

The secrecy of the key

How many keys are used with asymmetric (public key) cryptography?

Two one is referred to as the public key, and the other the private key.

Which of the following are characteristics of Elliptic Curve Cryptography ECC? (Select two.)

Elliptic curve cryptography (ECC) is an approach to cryptography that uses a finite set of values within an elliptic curve (an algebraic set of numbers). ECC is an asymmetric encryption algorithm.


Conjuntos de estudio relacionados

Physiology Unit 1 - Practice Quiz

View Set

Conduction, Convection and Thermal Radiation: Weather

View Set

Anatomy and Physiology Chapter 1 section 5

View Set

Drugs, society & behavior exam 3

View Set

med micro test #2 chapter 5 reading

View Set