Cryptography


Question 1

How many unique encryption keys are required for 2 people to exchange a series of messages using asymmetric public key cryptogrophy?

1 / 1 point

no keys are required

4

2

1

correct

2.

Question 2

What is Cryptographic Strength?

1 / 1 point

Relies on math, not secrecy

Ciphers that have stood the test of time are public algorithms.

Exclusive Or (XOR) is the “secret sauce” behind modern encryption.

All of the above.

Correct

Correct! All of these are critical.

3.

Question 3

What is the primary difference between Symmetric and Asymmetric encryption?

1 / 1 point

Symmetric encryption is inherently more secure than Asymmetric encryption.

Asymmetric uses only single-use keys so a subscription to a key vendor is required to obtain new keys.

The same key is used to both encrypt and decrypt the message.

Symmetric encryption is inherently less secure than Asymmetric encryption.

Correct

Correct! That is what is symmetric about the process.

4.

Question 4

Which type of cryptographic attack is characterized by an attack based upon trial and error where many millions of keys may be attempted in order to break the encrypted message?

1 / 1 point

Brute force

Rainbow tables

Social Engineering

Known Plaintext

Known Ciphertext

All of the above.

Correct

Correct! Modern computers can make billions of attempts per second, but good encryption could still make the process last billions of years.

5.

Question 5

What is the correct sequence of steps required for Alice to send a message to Bob using asymmetric encryption?

1 / 1 point

Alice and Bob exchange their public keys to confirm each other’s identity and then Alice uses her private key to encrypt the message that Bob can decrypt using his private key.

Alice requests Bob’s public key and uses it to encrypt her message. Alice then sends the encrypted message to Bob who decrypts it using his private key.

Alice and Bob exchange their private keys to confirm each other’s identity and then Alice uses her public key to encrypt the message that Bob can decrypt using his public key.

Alice uses her private key to encrypt her message and then sends it to Bob. Bob requests Alice’s public key and uses it to decrypt the message.

Correct

Correct! Alice gets Bob’s public key and uses it to encrypt the message that only Bob’s secret private key can decrypt.

Click here to order similar paper @Udessaywriters.com.100% Original.Written from scratch by professional writers.

You May Also Like

About the Author: admin