Encryption, RSA, ECC & Homomorphic Crypto |Verified
Questions with A+ Graded Answers
Public key encryption is an asymmetric key method that uses a public key (which can be
distributed) and a private key (which should be kept private).
True
False
_____ cryptography is better suited for real-time communications implementations than
______ cryptography.
Conventional, Light-weight
Symmetric, Asymmetric
Asymmetric, symmetric
Asymmetric, Public-key
Given the list below, the most common practical uses for public-key cryptography
include_______. Select two.
Hashing data
Encrypting of data within a tunnel
Identity checking
Key protection
RSA derives its security from the computational difficulty of factoring large integers that are the
product of two large ______ numbers.
Rational
Odd
Prime
Even
Deriving key pairs in public-key cryptography involves multiplying two large prime numbers. The
difficulty of, and time required to determine the prime numbers used in that process, forms the
, basis of public-key cryptography security. The process used to determine the original primes is
known as______.
Factoring
Forward engineering
Quantum binary
Hypothesis
________ is an alternative to PKI (Public Key Infrastructure), and involves generating the
encryption key from a piece of the identity of the recipient.
ECC
PHOTON
IBE
IKE
The _______ cryptosystem, is a homomorphic encryption scheme which allows two types of
computation:
addition of two ciphertexts, and
multiplication of a ciphertext by a plaintext number
ECC
MD5
Paillier
RC5
Select the options from the list below that support some form of homomorphic encryption.
Select all that apply.
SHA-1
SHA-256
RSA
Paillier
Use of RSA would be ideal for implementation in embedded systems with limited capacity for
heavy power and processing overhead.