Cryptography and Network Security

Computing

Quiz 9 :

Public-Key Cryptography and Rsa

Quiz 9 :

Public-Key Cryptography and Rsa

Question Type
search
arrow
Much of the theory of public-key cryptosystems is based on number theory.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
Plaintext is recovered from the ciphertext using the paired key and _____________ .
Free
Multiple Choice
Answer:

Answer:

C

Tags
Choose question tag
close menu
arrow
A major advance in symmetric cryptography occurred with the development of the rotor encryption/decryption machine.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
Asymmetric algorithms rely on one key for encryption and a different but related key for decryption.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Public-key encryption is also known as ___________ .
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Asymmetric encryption can be used for confidentiality but not for authentication.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Asymmetric encryption utilizes only a public key for encryption and decryption.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A public-key encryption scheme is not vulnerable to a brute-force attack.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A trap-door one-way function is easy to calculate in one direction and infeasible to calculate in the other direction unless certain additional information is known.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Public-key encryption is more secure from cryptanalysis than symmetric encryption.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Asymmetric encryption can be used for __________ .
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Before the application of the public-key cryptosystem each participant must generate a pair of keys.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the most widely used public-key cryptosystem is __________ .
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
the encryption algorithm performs various transformation on the ciphertext.
True False
Answer:
Tags
Choose question tag
close menu
arrow
timing attacks are ciphertext attacks that are only applicable to RS
True False
Answer:
Tags
Choose question tag
close menu
arrow
the defense against the brute-force approach for RSA is to use a large key space.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Plaintext is transformed into ciphertext using two keys and a decryption algorithm.
True False
Answer:
Tags
Choose question tag
close menu
arrow
If the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and sequencing.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Asymmetric encryption transforms plaintext into ciphertext.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Asymmetric encryption is also known as ___________ .
Multiple Choice
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 45