Practice 9.6.3
Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature?
Mary's private key
Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates?
Private keys
Which of the following is used in conjunction with a local security authority to generate the private and public key pair used in asymmetric cryptography?
CSP
Implements the Diffie-Hellman key exchange protocol using elliptic curve cryptography
ECDH
Which cryptography system generates encryption keys that could be used with DES, AES,IDEA, RC5, or any other symmetric cryptography solution?
Diffie-Hellman
Which of the following algorithms are used in asymmetric encryption? (2)
Diffie-Hellman/ RSA
Which form of asymmetric cryptography is based up Diffie-Hellman?
El Gamal
Exist only for the lifetime of a specific communication session
Ephemeral keys
A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. Which of the following must the receiver use to access the hashing value and verify the integrity of the transmission
Sender's public key
Digital signatures are created using
the sender's private key.
Uses no deterministic algorithm when generating public keys
Perfect forward secrecy
Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message?
Sam's public key
Can be reused by multiple communication sessions
Static keys
The success of asymmetric encryption is dependent upon which of the following?
The secrecy of the key
How many keys are used with asymmetric (public key) cryptography?
Two
Which of the following are characteristics of ECC (2)
Uses a finite set of values within an algebraic field/ Asymmetric encryption