Practice 9.6.3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature?

Mary's private key

Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?

Private keys

Which of the following is used in conjunction with a local security authority to generate the private and public key pair used in asymmetric cryptography?

CSP

Implements the Diffie-Hellman key exchange protocol using elliptic curve cryptography

ECDH

Which cryptography system generates encryption keys that could be used with DES, AES,IDEA, RC5, or any other symmetric cryptography solution?

Diffie-Hellman

Which of the following algorithms are used in asymmetric encryption? (2)

Diffie-Hellman/ RSA

Which form of asymmetric cryptography is based up Diffie-Hellman?

El Gamal

Exist only for the lifetime of a specific communication session

Ephemeral keys

A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission

Sender's public key

Digital signatures are created using

the sender's private key.

Uses no deterministic algorithm when generating public keys

Perfect forward secrecy

Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?

Sam's public key

Can be reused by multiple communication sessions

Static keys

The success of asymmetric encryption is dependent upon which of the following?

The secrecy of the key

How many keys are used with asymmetric (public key) cryptography?

Two

Which of the following are characteristics of ECC (2)

Uses a finite set of values within an algebraic field/ Asymmetric encryption


Ensembles d'études connexes

CWI Online Environmental Science Final

View Set

HAZWOPER 40 Lesson 5: Hazardous Chemical Awareness

View Set

Lesson 13 Chapter 17: Life Cycle Nutrition: Adulthood and the Later Years

View Set

FIN 311 Chapter 6: Discounted Cash Flow Valuation

View Set

NAQT - You Gotta Know: Geography

View Set