# Quiz 9: Public-Key Cryptography and Rsa

Computing

Free

True False

False

Free

True False

False

Free

True False

True

Free

True False

Q 5Q 5

A major advance in symmetric cryptography occurred with the
development of the rotor encryption/decryption machine.

Free

True False

Free

True False

Free

True False

Q 8Q 8

Asymmetric algorithms rely on one key for encryption and a
different but related key for decryption.

Free

True False

Free

True False

Q 10Q 10

If the authenticator is encrypted with the sender's private key, it
serves as a signature that verifies origin, content, and sequencing.

Free

True False

Q 11Q 11

A trap-door one-way function is easy to calculate in one direction
and infeasible to calculate in the other direction unless certain
additional information is known.

Free

True False

Free

True False

Q 13Q 13

Before the application of the public-key cryptosystem each
participant must generate a pair of keys.

Free

True False

Free

True False

Free

True False

Q 16Q 16

Asymmetric encryption is also known as ___________ .
A)public-key encryption
B)private-key encryption
C)optimal-key encryption
D)digital-key encryption

Free

Multiple Choice

Q 17Q 17

Public-key encryption is also known as ___________ .
A)digital-key encryption
B)asymmetric encryption
C)one-way time-exchange encryption
D)optimal-key encryption

Free

Multiple Choice

Q 18Q 18

Asymmetric encryption can be used for __________ .
A)both confidentiality and authentication
B)neither confidentiality nor authentication
C)confidentiality
D)authentication

Free

Multiple Choice

Q 19Q 19

Plaintext is recovered from the ciphertext using the paired key and _____________ .
A)a digital signature
B)a recovery encryption
C)a decryption algorithm
D)an encryption algorithm

Free

Multiple Choice

Q 20Q 20

the most widely used public-key cryptosystem is __________ .
A)optimal asymmetric encryption
B)asymmetric encryption
C)RSA
D)DES

Free

Multiple Choice

Q 21Q 21

Public-key algorithms are based on __________ .
A)permutation
B)mathematical functions
C)substitution
D)symmetry

Free

Multiple Choice

Q 22Q 22

__________ are two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.
A)Asymmetric keys
B)Key exchanges
C)Symmetric keys
D)Cipher keys

Free

Multiple Choice

Q 23Q 23

the __________ indicates that the subscriber identified in the certificate has sole control and access to the private key.
A)OAEP
B)Public Key Certificate
C)Digital Signature
D)PKI

Free

Multiple Choice

Q 24Q 24

A __________ is a cryptographic algorithm that uses two related keys, a public key and a private key.the two keys have the property that deriving the private key from the public key is computationally infeasible.
A)Private Key (Symmetric) Cryptographic Algorithm
B)Key Exchange Cryptographic Algorithm
C)Public Key (Asymmetric) Cryptographic Algorithm
D)RSA Digital Cryptographic Algorithm

Free

Multiple Choice

Free

Multiple Choice

Q 26Q 26

the key used in symmetric encryption is referred to as a __________ key.
A)public
B)secret
C)private
D)decryption

Free

Multiple Choice

Q 27Q 27

the readable message or data that is fed into the algorithm as input is the ____________ .
A)ciphertext
B)exchange
C)plaintext
D)encryption

Free

Multiple Choice

Q 28Q 28

two issues to consider with the computation required to use RSA are encryption/decryption and __________ .
A)time complexity
B)trap-door one-way functions
C)key generation
D)asymmetric encryption padding

Free

Multiple Choice

Q 29Q 29

__________ depend on the running time of the decryption algorithm.
A)Mathematical attacks
B)timing attacks
C)Chosen ciphertext attacks
D)Brute-force attacks

Free

Multiple Choice

Q 30Q 30

We define the ___________ of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps.this is a common measure of the efficiency of an algorithm.
A)time complexity
B)one-way function
C)timing attack
D)OAEP

Free

Multiple Choice

Q 31Q 31

__________ encryption is a form of cryptosystem in which encryption and decryption are performed using a public key and a private key.

Free

Short Answer

Free

Short Answer

Q 33Q 33

Asymmetric encryption transforms plaintext into __________ using one of two keys and an encryption algorithm.

Free

Short Answer

Q 34Q 34

the difficulty of attacking __________ is based on the difficulty of finding the prime factors of a composite number.

Free

Short Answer

Q 35Q 35

Public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to ___________ encryption, which uses only one key.

Free

Short Answer

Q 36Q 36

A __________ is a digital document issued and digitally signed by the private key of a Certification Authority that binds the name of a subscriber to a public key.

Free

Short Answer

Q 37Q 37

the __________ is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.

Free

Short Answer

Q 38Q 38

the scrambled message produced as output is the __________ .It depends on the plaintext and the key.

Free

Short Answer

Q 39Q 39

A __________ is one that maps a domain into a range such that every function value has a unique inverse, with the condition that the calculation of the function is easy, whereas the calculation of the inverse is infeasible.

Free

Short Answer

Q 40Q 40

"the sender 'signs' a message with its private key.Signing is
achieved by a cryptographic algorithm applied to the message
or to a small block of data that is a function of the message," is
a description of a ___________ .

Free

Short Answer

Q 41Q 41

the __________ scheme is a block cipher in which the plaintext
and ciphertext are integers between 0 and n - 1 for some n.

Free

Short Answer

Q 42Q 42

A single algorithm that will calculate the greatest common
divisor (gcd) of two integers and, if the gcd is 1, determine the inverse of one of the integers modulo the other, is the __________ algorithm.

Free

Short Answer

Q 43Q 43

Five possible approaches to attacking the RSA algorithm are:
brute force, mathematical attacks, hardware fault-based attack, chosen ciphertext attacks, and ___________ .

Free

Short Answer

Q 44Q 44

A __________ is an attack in which the adversary chooses a
number of ciphertexts and is then given the corresponding plaintexts, decrypted with the target's private key.

Free

Short Answer

Q 45Q 45

to counter attacks such as CCAs, RSA Security, Inc.
recommends modifying the plaintext using a procedure known as ___________ .

Free

Essay