chapter 8 Flashcards

1
Q

What is the purpose of encrypting a message with a public key in public key cryptography?

A

to ensure that only the holder of the private key can decrypt the masseges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is a key issue with public keys being publicly available?

A

Anyone could claim a public key as theirs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Certificate Authority (CA)?

A

A trusted third parties verify the public to ensure the authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does a CA help in public key infrastructure?

A

: It verifies the identity of the public key holder, ensuring that the key truly belongs to the claimed owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a digital signature?

A

the sender signs the message with a private key and allow the receiver to verify the sign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the steps in the digital signature process?

A

A: 1. Sender encrypts part of the message with their private key.
2. Sends the message and signature.
3. Receiver decrypts the signature using the sender’s public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

name four algorithms used for digital signatures.

A

1.RSA, 2.ECC , DSA ,Elgmal Signture shceme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is key exchange in cryptography?

A

A process where two parties cooperate to exchange a session key securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q: Which algorithm is commonly used for secure key exchange?

A

Diffie-Hellman.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q: What is the purpose of a session key in key exchange?

A

To provide a shared key for symmetric encryption between two users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does Public Key Infrastructure (PKI) consist of?

A

system combining of software services encryption to secure internet communication and transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the main components of PKI?

A

Certificates, public key cryptography, and certification authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the five main uses of Public Key Infrastructure (PKI).

A

Authentication, Integrity, Privacy, Authorization, Non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly