DRO2 Chapter 4 Knowledge Check (C839v5 and D334)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Regarding an elliptic curve, a non vertical line will intersect the curve how many times?

1 2 3 4

According to Moore's law, computing capability essentially doubles every how often?

24 months 5 years 18 months 12 months

_____ cryptography is better suited for real-time communications implementations than ______ cryptography.

Conventional, Light-weight Symmetric, Asymmetric Asymmetric, symmetric Asymmetric, Public-key

______ is a public key encryption method that is an extension of El Gamal but adds a one-way hashing method which protects against an adaptive chosen ciphertext attack.

Cramer-Shoup SHA-Gamal AES-CBC AES

The _______ cryptosystem, is a homomorphic encryption scheme which allows two types of computation: addition of two ciphertexts, and multiplication of a ciphertext by a plaintext number

ECC MD5 Paillier RC5

________ is an alternative to PKI (Public Key Infrastructure), and involves generating the encryption key from a piece of the identity of the recipient.

ECC PHOTON IBE IKE

Of the two knapsack problems resident in public key cryptography, which is the more difficult to solve?

Escrow key Secret key Private key Public key

Deriving key pairs in public-key cryptography involves multiplying two large prime numbers. The difficulty of, and time required to determine the prime numbers used in that process, forms the basis of public-key cryptography security. The process used to determine the original primes is known as______.

Factoring Forward engineering Quantum binary Hypothesis

Given the list below, the most common practical uses for public-key cryptography include_______. Select two.

Hashing data Encrypting of data within a tunnel Identity checking Key protection

Select the options from the list below that support some form of homomorphic encryption. Select all that apply.

SHA-1 SHA-256 RSA Paillier

Shawn sends Patrick a digitally signed message using asymmetric cryptography. What key will Patrick use to decrypt the message once received?

Shawn's public key Shawn's private key Patrick's public key Patrick's private key

Shawn sends Patrick a digitally signed message using asymmetric cryptography. What key will Patrick use to verify that the message was indeed sent by Shawn?

Shawn's public key Shawn's private key Patrick's public key Patrick's private key

Shawn sends Patrick a digitally signed message using asymmetric cryptography. What key will Shawn use to encrypt the message before sending it to Patrick?

Shawn's public key Shawn's private key Patrick's public key Patrick's private key

0 / 1 point According to Kirchhoff, the one component of a given crypto system that must be kept secret to prevent compromise of the system is the _____.

signature source code key algorithm

Match the prime number factorization methods below with the associated algorithms.

⭢ Integer factorization RSA ⭢ Discrete logarithms El Gamal ⭢ Elliptic curve relationships Elliptic Curve

Match the benefits of cryptography below with the appropriate descriptions.

⭢ Keeping things secret Confidentiality ⭢ Knowing that a message was not changed Integrity ⭢ Denies ability of someone to say "it wasn't me" Non-repudiation ⭢ Proving where a message came from Proof of origin ⭢ Idea that the communication is with intended person Authenticity

Josh sends Shawn a digitally signed message using asymmetric cryptography. What key will Josh use to sign the message?

Josh's public key Josh's private key Shawn's public key Shawn's private key

Steve is looking for a mechanism to use to for generating RSA private keys and does not have budget to leverage any pricey solution. What would you recommend Steve look into as a potential solution?

OpenSSL OCSP CRL Splunk

____ calculations can be used to justify that RSA works correctly and accurately, i.e. prove that the decrypted message is indeed the original message from the sender.

Pseudorandom Homomorphic Fermat's little theorem Moore's law

In comparing ECC and RSA, which would be better suited for use with embedded systems?

RSA, as embedded systems which would struggle to cope with the processing requirements of ECC ECC, as embedded systems which would struggle to cope with the processing requirements of RSA

______is seen as a replacement for RSA, especially for embedded systems which would struggle to cope with the processing requirements of RSA.

RSA-Lite MD5 Elliptic curve RSA-1

RSA derives its security from the computational difficulty of factoring large integers that are the product of two large ______ numbers.

Rational Odd Prime Even

El Gamal is a symmetric key cryptography method that is used in both encryption and digital signing. It is used in many applications and uses discrete logarithms.

True False

Public key encryption is an asymmetric key method that uses a public key (which can be distributed) and a private key (which should be kept private).

True False

Use of RSA would be ideal for implementation in embedded systems with limited capacity for heavy power and processing overhead.

True False

What type of encryption allows us to operate on data without having to decrypt it first.

homomorphic mono-alphabetic homophonic quantum

With Bitcoins, the _____ key defines our identity and we use it to sign for transactions, and prove our identity to others with the ______ key when making use of ECC.

local, ephemeral ephemeral, local private, public public, private

Cramer-Shoup is a public key encryption method that is an extension of El Gamal but adds a _______ which protects against an adaptive chosen ciphertext attack.

one-way hashing method initialization vector randomizer pseudo-random number generator


Ensembles d'études connexes

Civics Test #1 (lessons 1, 2, 3, & 5)

View Set

CIST 1011: 10.3.7 Practice Questions

View Set

EMT Chapter 30: Abdominal and Genitourinary Injuries

View Set

Phrasal Verbs Pract., ENG-RUS, 1 of 8

View Set

Udemy Java Multithreading Concurrency course

View Set

Greece multiple choice, true or false, and fill in the blank

View Set