asymmetric encryption Flashcards

1
Q

______ encryption uses keys that are mathematically related

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the two key used in asymmetric encryption

A

public and private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

asymmetric encryption is used for

A

data encryption
a digital signature
key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

asymmetric encryption is used with which protocols

A
SSL/TLS
IPSec
VPN
S/MIME
SSH tunnels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______ keys generated every time the key establishment process is executed and only exists for the lifetime of the session

A

ephemeral

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ keys can be reused by multiple communication sessions

A

static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

this asymmetric system was the first asymmetric algorithm.

A

Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

this asymmetric system is based on discrete logarithm problems

A

ElGamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this asymmetric system is based on group of number in a elliptical curve

A

elliptic curve crypto (ECC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this asymmetric system was the first is based on subset sum problems

A

merkel-hellman knapsack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this asymmetric system is based on forcing large number into prime values

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a ______ cryptography system combines the strengths of both the symmetric and asymmetric cryptography systems

A

hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Diffie-Hellman uses a _______ protocol generates symmetric keys simultaneously at sender and recipient sites over non-secure channels

A

key agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Diffie-Hellman does not use

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly