6-5 Flashcards

1
Q

public key method developed in 77 by Rivset, Shamir and Adlman.

A

rsa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a public key encryption method means that there are not concerns with the ____________

A

distributing the keys for encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RSA is much ______ than symetric ciphers

A

slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

based on 2 large prime numbers. as in 12024, 2048, 4096 and larger keys.

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

No efficient way exists to factor

A

large prime numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

if anyone ever invents an efficient way to factor large prime numbers efficiently the RSA would be

A

dead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

probably the most well known asymetric encryption method. allows 2 parties to establish a shared key over an insecure channel. developed in 1976

A

diffie hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

based on diffie hellman key exchange algorithms. first described by taher elgamal in 1984. its used in some versions of PGP ( Pretty Good Privacy)

A

ElGamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a protocol for key agreement that is based on diffie hellmen. first proposed by Menezes, Qu, and Vanstone in 1995. incorporated in the public key standard IEEE P1363

A

MQV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

US Patent 5,231,668 firled 26 July 1991and attributed to David W Kravitz. adopted by us govt in 1993 with FIPS 186

A

DSA ( Digital Signature Algorithim)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

first decribed by Victor Miller(IBM) and Neil Koblitz ( university of Washington) in 1985. based on the fact that finding the discrete logarithim of a random elliptic curve element with respect to a publically known base point is difficult and impractuical.

A

Elliptic Curve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the size of the elliptic curve ____________of the finding the algorithim

A

ECC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this uses asymetric cryptography in reverse order

A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Avoid Fraud: Vendors that advertise UNBREAKABLE encryption

A

no code of method is completly secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Avoid Fraud: Vendors that advertise CERTIFIED products

A

no recognized certification process for encryption methods exists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Avoid Fraud: Look for vendor experience

A

check tosee what experience a company has with encryption