Questions
Now, it's time to check your knowledge. Select the best response to the following questions and then check your answers, found in the Assessment section at the end of the book:
- _____is a key agreement protocol, designed to have each party generate the same shared secret key that will be used in the session.
a. PGP
b. Diffie-Hellman
c. GPG
d. Rivest, Shamir, Adleman
- PKCS _____defines the construct of an X.509 certificate from the CA, and includes components such as a public key, a distinguished name, and a digital signature of the CA.
a. #1
b. #5
c. #7
d. #10
- _____ uses a variety of encryption key lengths that include 1,024-bit, 2,048-bit, and 4,096-bit lengths.
a. DES
b. ECC
c. RSA
d. AES
- Most encryption systems are ____ and use both symmetric and asymmetric encryption.
a. hybrid
b. ElGamal
c. public
d. elliptical
- The dominant operation in ECC cryptographic schemes is _____multiplication.
a. Diffie
b. ElGamal
c. point
d. certificate
- The _____ works when assigning...