In: Computer Science
How do we know the Public Key for a person is turly theirs?
A. |
It decrypts by private key |
|
B. |
It is verified by a Digital Certificate issued by a trusted CA |
|
C. |
The product of the two keys is the original large prime |
|
D. |
All of these |
Which of these is true of a public key cipher?
A. |
AES is the current algorithm |
|
B. |
Any number of people can send someone an encrypted message with Public Key, and they can decrypt it with their private key |
|
C. |
A single key is used for both encryption and decryption |
|
D. |
It has been superseded by symmetric key algorithms |
|
E. |
It has been superseded by one-time pad algorithms |
Which of theses is a disadvantage of public key cryptography relative to symmetric key cryptography?
A. |
They require two keys instead of just one |
|
B. |
They are slower |
|
C. |
They require larger keys to be secure |
|
D. |
All of these |
What bad cryptographic practice got the Soviet Union in trouble during the Cold War?
A. |
Re-using one time cryptographic pads |
|
B. |
Using Outdate cryptographic systems |
|
C. |
None of these |
|
D. |
Lack of awareness of spies being under surveillance. |
Which of these is the current reccomended symmetric cryptography algorithm?
A. |
None of these |
|
B. |
Caesar |
|
C. |
DES |
|
D. |
RSA |
The answer is B. It is verified by a Digital Certificate issued by a trusted CA.
Option B is the answer.
D.All of the above
C. None of these.
A.None of these.