100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

C839v5 / D334 DRO2 Chapter 4 – Asymmetric Encryption, RSA, ECC & Homomorphic Crypto |Verified Questions with A+ Graded Answers

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
01-02-2026
Written in
2025/2026

C839v5 / D334 DRO2 Chapter 4 – Asymmetric Encryption, RSA, ECC & Homomorphic Crypto |Verified Questions with A+ Graded Answers Public key encryption is an asymmetric key method that uses a public key (which can be distributed) and a private key (which should be kept private). True False _____ cryptography is better suited for real-time communications implementations than ______ cryptography. Conventional, Light-weight Symmetric, Asymmetric Asymmetric, symmetric Asymmetric, Public-key Given the list below, the most common practical uses for public-key cryptography include_______. Select two. Hashing data Encrypting of data within a tunnel Identity checking Key protection RSA derives its security from the computational difficulty of factoring large integers that are the product of two large ______ numbers. Rational Odd Prime Even Deriving key pairs in public-key cryptography involves multiplying two large prime numbers. The difficulty of, and time required to determine the prime numbers used in that process, forms the basis of public-key cryptography security. The process used to determine the original primes is known as______. Factoring Forward engineering Quantum binary Hypothesis ________ is an alternative to PKI (Public Key Infrastructure), and involves generating the encryption key from a piece of the identity of the recipient. ECC PHOTON IBE IKE The _______ cryptosystem, is a homomorphic encryption scheme which allows two types of computation: addition of two ciphertexts, and multiplication of a ciphertext by a plaintext number ECC MD5 Paillier RC5 Select the options from the list below that support some form of homomorphic encryption. Select all that apply. SHA-1 SHA-256 RSA Paillier Use of RSA would be ideal for implementation in embedded systems with limited capacity for heavy power and processing overhead. True False In comparing ECC and RSA, which would be better suited for use with embedded systems? RSA, as embedded systems which would struggle to cope with the processing requirements of ECC ECC, as embedded systems which would struggle to cope with the processing requirements of RSA ______ is a public key encryption method that is an extension of El Gamal but adds a one-way hashing method which protects against an adaptive chosen ciphertext attack. Cramer-Shoup SHA-Gamal AES-CBC AES With Bitcoins, the _____ key defines our identity and we use it to sign for transactions, and prove our identity to others with the ______ key when making use of ECC. local, ephemeral ephemeral, local private, public public, private El Gamal is a symmetric key cryptography method that is used in both encryption and digital signing. It is used in many applications and uses discrete logarithms. True False Cramer-Shoup is a public key encryption method that is an extension of El Gamal but adds a _______ which protects against an adaptive chosen ciphertext attack. one-way hashing method initialization vec

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
February 1, 2026
Number of pages
7
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

C839v5 / D334 DRO2 Chapter 4 – Asymmetric
Encryption, RSA, ECC & Homomorphic Crypto |Verified
Questions with A+ Graded Answers
Public key encryption is an asymmetric key method that uses a public key (which can be
distributed) and a private key (which should be kept private).

True

False

_____ cryptography is better suited for real-time communications implementations than
______ cryptography.

Conventional, Light-weight

Symmetric, Asymmetric

Asymmetric, symmetric

Asymmetric, Public-key

Given the list below, the most common practical uses for public-key cryptography
include_______. Select two.

Hashing data

Encrypting of data within a tunnel

Identity checking

Key protection

RSA derives its security from the computational difficulty of factoring large integers that are the
product of two large ______ numbers.

Rational

Odd

Prime

Even

Deriving key pairs in public-key cryptography involves multiplying two large prime numbers. The
difficulty of, and time required to determine the prime numbers used in that process, forms the

, basis of public-key cryptography security. The process used to determine the original primes is
known as______.

Factoring

Forward engineering

Quantum binary

Hypothesis

________ is an alternative to PKI (Public Key Infrastructure), and involves generating the
encryption key from a piece of the identity of the recipient.

ECC

PHOTON

IBE

IKE

The _______ cryptosystem, is a homomorphic encryption scheme which allows two types of
computation:

addition of two ciphertexts, and
multiplication of a ciphertext by a plaintext number

ECC

MD5

Paillier

RC5

Select the options from the list below that support some form of homomorphic encryption.
Select all that apply.

SHA-1

SHA-256

RSA

Paillier

Use of RSA would be ideal for implementation in embedded systems with limited capacity for
heavy power and processing overhead.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectAziim Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
2 year
Number of followers
13
Documents
4143
Last sold
3 months ago
Dont stress yourself on study materials .LectAziim got it all

"Unlock your potential with our online writing store! Discover expert guidance, personalized feedback, and tools for every writer's journey. From crafting compelling essays to mastering creative storytelling, our platform offers interactive courses, one-on-one coaching, and resources tailored to your goals. Start writing your success story today with us!"

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions