3.4
Chapter 3
3.4
Digital signatures are created using the sender's _______ key. Thus, only the sender's _______ key can be used to verify and open any data encrypted with the sender's private key
private key. Thus, only the sender's public key
Which form of asymmetric cryptography is based upon DiffieHellman? RSA MerkleHellman Knapsack El Gamal ECC
El Gamal
Implements the DiffieHellman key exchange protocol using elliptic curve cryptography Exist only for the lifetime of a specific communication session Uses no deterministic algorithm when generating public keys Can be reused by multiple communication sessions Ephemeral keys Perfect forward secrecy ECDH Elliptic curve Static keys
Implements the DiffieHellman key exchange protocol using elliptic curve cryptography ECDH Exist only for the lifetime of a specific communication session Ephemeral keys Uses no deterministic algorithm when generating public keys Perfect forward secrecy Can be reused by multiple communication sessions Static keys
Mary wants to send a message to Sam. She wants to digitally sign the message to prove that she sent it. Which key would Mary use to create the digital signature? Sam's private key Mary's public key Sam's public key Mary's private key
Mary's private key
Mary wants to send a message to Sam so that only Sam can read it. Which key would be used to encrypt the message? Mary's public key Sam's public key Sam's private key
Sam's public key
The strength of a cryptosystem is dependent upon which of the following? Secrecy of the algorithm Secrecy of the key Complexity of the cipher text Integrity of the individuals who created the cryptosystem
Secrecy of the key
A receiver wants to verify the integrity of a message received from a sender. A hashing value is contained within the digital signature of the sender. What must the receiver use to access the hashing value to verify the integrity of the transmission? Sender's public key Receiver's private key Sender's private key Receiver's public key
Sender's public key
Algorithms that support asymmetric encryption acronym DEER
The D stands for Diffie-Hellman. One of the E's stands for ELGamal. Another E stands for Elliptical Curve, also known as Elliptical Curve Cryptography, or ECC. And the last one is very common, RSA.
Which of the follow are characteristics of ECC? (Select two.) Uses a finite set of values within an algebraic field Symmetric encryption Uses multiplication of large prime numbers Asymmetric encryption
Uses a finite set of values within an algebraic field Asymmetric encryption ECC is Elliptic curve cryptography (ECC)
Which of the following generates the key pair used in asymmetric cryptography? CA CRL OCSP CPS CSP
Cryptographic Service Provider (CSP)
Which cryptography system generates encryption keys that could be used with DES, AES, IDEA, RC5 or any other symmetric cryptography solution? MerkleHellman Knapsack RSA Elliptical Curve DiffieHellman
DiffieHellman
Which of the following algorithms are used in asymmetric encryption? (Select two.) DiffieHellman Twofish AES Blowfish RSA
DiffieHellman RSA
Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for digital certificates? Cryptographic algorithm Hash values Public keys Private keys
Private keys