CRY- CHAP 9
C
9.A __________ is a cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that deriving the private key from the public key is computationally infeasible. A.Private Key (Symmetric) Cryptographic Algorithm B.Key Exchange Cryptographic Algorithm C.Public Key (Asymmetric) Cryptographic Algorithm D.RSA Digital Cryptographic Algorithm
A
A major advance in symmetric cryptography occurred with the development of the rotor encryption/decryption machine. A. TRUE B. FALSE
B
A public-key encryption scheme is not vulnerable to a brute-force attack. A. TRUE B. FALSE
A
A trap-door one-way function is easy to calculate in one direction and infeasible to calculate in the other direction unless certain additional information is known. A. TRUE B. FALSE
A
Before the application of the public-key cryptosystem each participant must generate a pair of keys A. TRUE B. FALSE
B
The __________ indicates that the subscriber identified in the certificate has sole control and access to the private key. A. OAEP B. Public Key Certificate C. Digital Signature D. PKI
C
Two issues to consider with the computation required to use RSA are encryption/decryption and __________ . A. time complexity B. trap-door one-way functions C. key generation D. asymmetric encryption padding
A
__________ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification. A. Asymmetric keys B. Key exchanges C. Symmetric keys D. Cipher keys
A
Asymmetric algorithms rely on one key for encryption and a different but related key for decryption A. TRUE B. FALSE
A
Asymmetric encryption can be used for __________ . A.both confidentiality and authentication B.neither confidentiality nor authentication C.confidentiality D.authentication
B
Asymmetric encryption can be used for confidentiality but not for authentication. A. TRUE B. FALSE
A
Asymmetric encryption is also known as __________ A. public-key encryption B. private-key encryption C. optimal encryption D. digital-key encryption
A
Asymmetric encryption transforms plaintext into ciphertext A. TRUE B. FALSE
B
Asymmetric encryption utilizes only a public key for encryption and decryption. A. T B. F
A
If the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and sequencing A. TRUE B. FALSE
A
Much of the theory of public-key cryptosystems is based on number theory. A. TRUE B. FALSE
C
Plaintext is recovered from the ciphertext using the paired key and a _____________ . A. digital signature B. recovery encryption C. decryption algorithm D. encryption algorithm
B
Plaintext is transformed into ciphertext using two keys and a decryption algorithm. A. TRUE B. FALSE
B
Public-key algorithms are based on __________ . A. permutation B. mathematical functions C. substitution D. symmetry
B
Public-key encryption is also known as ___________ . A. digital-key encryption B. asymmetric encryption C. one way time exchange encryption D. optimal-key encryption
B
Public-key encryption is more secure from cryptanalysis than symmetric encryption A. TRUE B. FALSE
A
The defense against the brute-force approach for RSA is to use a large key space. A. TRUE B. FALSE
B
The encryption algorithm performs various transformation on the ciphertext. A. TRUE B. FALSE
B
The key used in symmetric encryption is referred to as a __________ key. A. public B. secret C. private D. decryption
C
The most widely used public-key cryptosystem is __________ . A. optimal asymmetric encryption B. asymmetric encryption C. RSA D. DES
C
The readable messageor data that is fed into the algorithm as input is the ____________ . A. ciphertext B. exchange C. plaintext D. encryption
B
Timing attacks are ciphertext attacks that are only applicable to RSA. A. TRUE B. FALSE