Description
1.What is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys?
- A. Digital Signatures
- B. Public-Key Cryptosystems
- C. Elliptical curve cryptography (ECC)
- D. RSA Cryptosystem
2. What type of cryptography generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime numbers.
- A. Elliptical curve cryptography (ECC)
- B. RSA Cryptosystem
- C. Public-Key Cryptosystems
- D. symetric-key encryption
3. Hashes of two sets of data should match if and only if the corresponding data also matches. True or False? (*Manually graded*)
Maximum number of characters (including HTML tags added by text editor): 32,000 |
4. What creates a check-sum for the information within an object so the recipient can verify that the content was received unaltered?
- A. Digital Certificates
- B. Electronic Certificates
- C. Electronic Signatures
- D. Digital signatures
5. Which of the following is "NOT" a well-known message-digest hash function used in cryptography?
- A. MD2
- B. MD4
- C. MD5
- D. MD7
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
This work is also complete:Please see the attached response and let me know if you need any changes carried.
check_circle mariam90 marked this question as complete.
Quiz Q& A
1.What is a public key enc...