You are on page 1of 2

The ________ method provides a one-time session key for two parties.

A)
Diffie-Hellman
B)
RSA
C)
DES
D)
AES
The _________ attack can endanger the security of the Diffie-Hellman method if t
wo parties are not authenticated to each other.
A)
man-in-the-middle
B)
ciphertext attack
C)
plaintext attack
D)
none of the above
The man-in-the-middle attack can endanger the security of the Diffie-Hellman met
hod if two parties are not
Authenticated
Joined
Submit
Separate
Diffie - Helman key exchange is vulnerable to_____________
Discrete Logarithm
Elliptic Curve Cryptography
Natural Logarithm
Modular Arithmetic
Assymmetric Encryption: Why can a message encrypted with the Public Key only be
decrypted with the receiver's appropriate Private Key?
Not true, the message can also be decrypted with the Public Key.
A so called "one way function with back door" is applyed for the encryption.
The Public Key contains a special function which is used to encrypt the message
and which can only be reversed by the appropriate Private Key.
The encrypted message contains the function for decryption which identifies the
Private Key.
In which way does the Combined Encryption combine symmetric and assymmetric enc
ryption?
First, the message is encrypted with symmetric encryption and aferwards it is en
crypted assymmetrically together with the key.
The secret key is symmetrically transmitted, the message itself assymmetrically.
First, the message is encrypted with assymmetric encryption and aferwards it is
encrypted symmetrically together with the key.
The secret key is assymmetrically transmitted, the message itself symmetrically.
Which is the largest disadvantage of the symmetric Encryption?
More complex and therefore more time-consuming calculations.
Problem of the secure transmission of the Secret Key.
Less secure encryption function.
Isn't used any more.
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationsh
ip to
Others
Data
Keys
Each other
For RSA to work, the value of P must be less than the value of
p

q
n
r

You might also like