Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Cryptography and Network Security
Quiz 9: Public-Key Cryptography and Rsa
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
Public-key algorithms are based on __________ .
Question 22
Short Answer
A __________ is one that maps a domain into a range such that every function value has a unique inverse, with the condition that the calculation of the function is easy, whereas the calculation of the inverse is infeasible.
Question 23
Short Answer
the __________ is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.
Question 24
Short Answer
"the sender 'signs' a message with its private key.Signing is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message," is a description of a ___________ .