Asymmetric Encryption
Mary want to send a message to Sam. She wants to Julie send a message to prove that she sent it. Which key would marry used to create a digital signature?
Mary's private key
which of the following is used in conjunction with a local security authority to generate the private and public key pair used an asymmetric cryptography
CSP
which cryptography system generates encryption keys that could be used with des, aesidea, rc5 or any other symmetric cryptography solution
Diffie Hellman
which form of asymmetric cryptography is based upon Diffie Hellman
El Gamal
Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message
Sam's public key
implements the Diffie Hellman key exchange protocol using elliptic curve cryptography
ecdh
excess for only a lifetime of a specific communication session
ephemeral keys
uses no deterministic algorithm when generating public keys
perfect forward secrecy
Above All Else what must be protected to maintain the security and benefit of an asymmetric cryptographic solution especially if it is widely used for digital certificates
private keys
success of asymmetric encryption is dependent upon which of the following
secrecy of the key
a receiver wants to verify the Integrity of a message received from a sender. Josh and volume is contained within the digital signature of the sender. Which of the following was the receiver used to access the hashing values and verify the Integrity of the transmission?
senders public key
can be reused by multiple communication sessions
static keys
how many keys are used with asymmetric (public-key) cryptography?
two
which of the following algorithms are using asymmetric encryption
-Diffie Hellman -RSA
which of the following are characteristics of ECC?
-uses a finite set of values within an algebraic field - asymmetric encryption