Upgrade to remove ads Show
Only ₩37,125/year
Terms in this set (12)Bob wants to send Alice an encrypted message. Which key is used? Alice's Public key Alice wants to read an encrypted message sent by Bob. Which key is used? Alice's Private key
Bob wants to send a copy to himself of the encrypted message that he sent to Alice. Which key is used? Bob's public key to encrypt and private key to decrypt Bob receives and encrypted reply message from Alice. Which key is used? Bo's private key Bob wants Susan to read Alice's reply message that he received. Which key is used? Susan's public key Bob wants to send Alice a message with a digital signature. Which key is used? Bob's private key Alice wants to see Bob's digital signature. Which key is used? Bob's public key Describe the process of sending a confidential memo: The sender's message goes through a hash algorithm then a digest. The senders private key uses asymmetric cryptography to generate digital signature. The receiver gets the digital signature and goes through the sender's public key asymmetric cryptography to generate a digest. The digest uses a hash algorithm for finding matches. Once this is done, the receiver is able to read the message. What is the public key used for in asymmetric cryptography? It is used for encryption What is the private key used for in asymmetric cryptography? It is used for decryption What kind of trust model does PGP (Pretty Good Privacy) use? It uses Web of Trust Model where participants authenticate the identities of other users When is a PKI (Public Key Infrastructure) required? It is necessary to help ascertain the identity of different people, devices, and services. It uses technologies such as digital signatures and digital certificates for credential validation Recommended textbook solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions
Introduction to the Theory of Computation3rd EditionMichael Sipser 389 solutions C++ How to Program10th EditionHarvey M. Deitel, Paul J. Deitel 698 solutions Sets with similar termsSecurity+ Chapter 10 (private/public keys)18 terms SirKoik Chapter 934 terms virginiagresham Unit 4 - Asymmetric Encryption44 terms mrxlowper Asymmetric Encryption and it's Uses39 terms isaac_swindell Sets found in the same folderSECURRITAY midterm90 terms hunter_hardin2 11.1 Man-In-The-Middle-Attacks4 terms ehillen3 ITM 380 Exam 159 terms singh4202 ITM380 Quiz/Practice Questions44 terms Alexa_Mikrut8 Other sets by this creatorLabs/Discussions51 terms JuanSee21 Module 652 terms JuanSee21 Module 536 terms JuanSee21 Module 452 terms JuanSee21 Verified questionsCOMPUTER SCIENCE Assuming all variables are declared correctly, which of the following swaps the values of x and y? I x=y; y=x; II tmp=x; y=x; x=tmp; III tmp=x; x=y; y=tmp; a. I only, b. II only, c. III only, d. II and III, e. I, II, and III. Verified answer COMPUTER SCIENCE True/False: GUIs are often built with a model-view architecture. Verified answer
COMPUTER SCIENCE If a file fails to open, the file stream object will be set to ________. Verified answer
COMPUTER SCIENCE How does a computer system store negative and real numbers in memory? Verified answer Other Quizlet setsPhysiology Exam Review Questions Chapter 1-15144 terms cassi_barryPLUS Examen 119 terms edp4902 Chapter 656 terms bravowhiskey11PLUS APES Final 1 Practice Questions27 terms P1003451 Related questionsQUESTION True or false: When using a key, the encryption cipher uses the cryptographic key to vary its output so that two correspondents can protect their information from anyone else who has the same cipher. 4 answers QUESTION If your PHP server does not work, there may be a port conflict with which application that also uses port 80? 2 answers QUESTION t/f In a known-plaintext attack (KPA), the cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be. 2 answers QUESTION Multichannel, multipoint distribution system (MMDS) providers are in direct competition with cable television companies. Although the price is very competitive, what is one disadvantage of this service? 7 answers How can Alice send Bob a message in a way that assures Bob that the message came from Alice?Alice wants to send Bob a message. She wants to assure data confidentiality, so she'll use asymmetric encryption to send it. She used Bob's public key to encrypt the message.
Which key is used to verify digitally signed message sent by Alice to Bob?This is where digital signatures come in. Before encrypting the message to Bob, Alice can sign the message using her private key; when Bob decrypts the message, he can verify the signature using her public key.
How does Alice guarantee to Bob that it was her who sent the message and that the message wasn't modified during transmission without encrypting the entire message?Generally, for signature purposes Alice will encrypt not her entire message but simply a secure hash of it, and then send both the message and the RSA-encrypted hash. Bob decrypts the encrypted hash, and the signature checks out if the result matches the hash of the corresponding message.
Which of the following would Alice use to encrypt a message to Bob if she is using asymmetric encryption?Alice can use her own Private Key to encrypt the message. Which makes it so the only key in the world that can decrypt her message is her Public key — which she knows Bob (and anyone else) has access to. The message is sent to Bob, who then uses Alice's Public Key to decrypt the message.
|