100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

C839v5 / D334 DRO2 Chapter 4 – Asymmetric Encryption, RSA, ECC & Homomorphic Crypto |Verified Questions with A+ Graded Answers

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
01-02-2026
Geschreven in
2025/2026

C839v5 / D334 DRO2 Chapter 4 – Asymmetric Encryption, RSA, ECC & Homomorphic Crypto |Verified Questions with A+ Graded Answers Public key encryption is an asymmetric key method that uses a public key (which can be distributed) and a private key (which should be kept private). True False _____ cryptography is better suited for real-time communications implementations than ______ cryptography. Conventional, Light-weight Symmetric, Asymmetric Asymmetric, symmetric Asymmetric, Public-key Given the list below, the most common practical uses for public-key cryptography include_______. Select two. Hashing data Encrypting of data within a tunnel Identity checking Key protection RSA derives its security from the computational difficulty of factoring large integers that are the product of two large ______ numbers. Rational Odd Prime Even Deriving key pairs in public-key cryptography involves multiplying two large prime numbers. The difficulty of, and time required to determine the prime numbers used in that process, forms the basis of public-key cryptography security. The process used to determine the original primes is known as______. Factoring Forward engineering Quantum binary Hypothesis ________ is an alternative to PKI (Public Key Infrastructure), and involves generating the encryption key from a piece of the identity of the recipient. ECC PHOTON IBE IKE The _______ cryptosystem, is a homomorphic encryption scheme which allows two types of computation: addition of two ciphertexts, and multiplication of a ciphertext by a plaintext number ECC MD5 Paillier RC5 Select the options from the list below that support some form of homomorphic encryption. Select all that apply. SHA-1 SHA-256 RSA Paillier Use of RSA would be ideal for implementation in embedded systems with limited capacity for heavy power and processing overhead. True False In comparing ECC and RSA, which would be better suited for use with embedded systems? RSA, as embedded systems which would struggle to cope with the processing requirements of ECC ECC, as embedded systems which would struggle to cope with the processing requirements of RSA ______ is a public key encryption method that is an extension of El Gamal but adds a one-way hashing method which protects against an adaptive chosen ciphertext attack. Cramer-Shoup SHA-Gamal AES-CBC AES With Bitcoins, the _____ key defines our identity and we use it to sign for transactions, and prove our identity to others with the ______ key when making use of ECC. local, ephemeral ephemeral, local private, public public, private El Gamal is a symmetric key cryptography method that is used in both encryption and digital signing. It is used in many applications and uses discrete logarithms. True False Cramer-Shoup is a public key encryption method that is an extension of El Gamal but adds a _______ which protects against an adaptive chosen ciphertext attack. one-way hashing method initialization vec

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Vak

Documentinformatie

Geüpload op
1 februari 2026
Aantal pagina's
7
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

C839v5 / D334 DRO2 Chapter 4 – Asymmetric
Encryption, RSA, ECC & Homomorphic Crypto |Verified
Questions with A+ Graded Answers
Public key encryption is an asymmetric key method that uses a public key (which can be
distributed) and a private key (which should be kept private).

True

False

_____ cryptography is better suited for real-time communications implementations than
______ cryptography.

Conventional, Light-weight

Symmetric, Asymmetric

Asymmetric, symmetric

Asymmetric, Public-key

Given the list below, the most common practical uses for public-key cryptography
include_______. Select two.

Hashing data

Encrypting of data within a tunnel

Identity checking

Key protection

RSA derives its security from the computational difficulty of factoring large integers that are the
product of two large ______ numbers.

Rational

Odd

Prime

Even

Deriving key pairs in public-key cryptography involves multiplying two large prime numbers. The
difficulty of, and time required to determine the prime numbers used in that process, forms the

, basis of public-key cryptography security. The process used to determine the original primes is
known as______.

Factoring

Forward engineering

Quantum binary

Hypothesis

________ is an alternative to PKI (Public Key Infrastructure), and involves generating the
encryption key from a piece of the identity of the recipient.

ECC

PHOTON

IBE

IKE

The _______ cryptosystem, is a homomorphic encryption scheme which allows two types of
computation:

addition of two ciphertexts, and
multiplication of a ciphertext by a plaintext number

ECC

MD5

Paillier

RC5

Select the options from the list below that support some form of homomorphic encryption.
Select all that apply.

SHA-1

SHA-256

RSA

Paillier

Use of RSA would be ideal for implementation in embedded systems with limited capacity for
heavy power and processing overhead.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
LectAziim Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
21
Lid sinds
2 jaar
Aantal volgers
13
Documenten
4143
Laatst verkocht
3 maanden geleden
Dont stress yourself on study materials .LectAziim got it all

"Unlock your potential with our online writing store! Discover expert guidance, personalized feedback, and tools for every writer's journey. From crafting compelling essays to mastering creative storytelling, our platform offers interactive courses, one-on-one coaching, and resources tailored to your goals. Start writing your success story today with us!"

5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen