In: Computer Science
How do we know the Public Key for a person is turly theirs?
| 
 A.  | 
 It decrypts by private key  | 
|
| 
 B.  | 
 It is verified by a Digital Certificate issued by a trusted CA  | 
|
| 
 C.  | 
 The product of the two keys is the original large prime  | 
|
| 
 D.  | 
 All of these  | 
Which of these is true of a public key cipher?
| 
 A.  | 
 AES is the current algorithm  | 
|
| 
 B.  | 
 Any number of people can send someone an encrypted message with Public Key, and they can decrypt it with their private key  | 
|
| 
 C.  | 
 A single key is used for both encryption and decryption  | 
|
| 
 D.  | 
 It has been superseded by symmetric key algorithms  | 
|
| 
 E.  | 
 It has been superseded by one-time pad algorithms  | 
Which of theses is a disadvantage of public key cryptography relative to symmetric key cryptography?
| 
 A.  | 
 They require two keys instead of just one  | 
|
| 
 B.  | 
 They are slower  | 
|
| 
 C.  | 
 They require larger keys to be secure  | 
|
| 
 D.  | 
 All of these  | 
What bad cryptographic practice got the Soviet Union in trouble during the Cold War?
| 
 A.  | 
 Re-using one time cryptographic pads  | 
|
| 
 B.  | 
 Using Outdate cryptographic systems  | 
|
| 
 C.  | 
 None of these  | 
|
| 
 D.  | 
 Lack of awareness of spies being under surveillance.  | 
Which of these is the current reccomended symmetric cryptography algorithm?
| 
 A.  | 
 None of these  | 
|
| 
 B.  | 
 Caesar  | 
|
| 
 C.  | 
 DES  | 
|
| 
 D.  | 
 RSA  | 
The answer is B. It is verified by a Digital Certificate issued by a trusted CA.
Option B is the answer.
D.All of the above
C. None of these.
A.None of these.