Question: Question 11 (1 point) Using public key encryption is computationally faster than using symmetric key encryption. Question 11 options: True False Save Question 12 (1

Question 11 (1 point)

Question 11 (1 point) Using public key encryption is computationally faster than

Using public key encryption is computationally faster than using symmetric key encryption.

Question 11 options:

True
False

Save

Question 12 (1 point)

using symmetric key encryption. Question 11 options: True False Save Question 12

The major long-term problem in developing effective encryption methods has been

Question 12 options:

developing effective scrambling methods

generating random keys

distributing keys in a secure manner

keeping the scrambling method secret

Save

Question 13 (1 point)

(1 point) The major long-term problem in developing effective encryption methods has

When using a public key encryption method, the message receiver needs to

Question 13 options:

securely send his/her public key to the message sender.

securely send his/her private key to the message sender.

make his/her public key available in an open, non-secure manner.

know the size of the sender's public key

Save

Question 14 (1 point)

been Question 12 options: developing effective scrambling methods generating random keys distributing

A hash algorithm is a one-way function.

Question 14 options:

True
False

Save

Question 15 (1 point)

keys in a secure manner keeping the scrambling method secret Save Question

Alice sends Bob a plaintext contract. When Bob receives the contract, he wants assurance that Eve did not change the contract during transmission. What actions can Alice and Bob take so that Bob receives the assurance he is seeking.

Question 15 options:

Alice can create a signed digest with her private key and send the digest and the contract to Bob. Bob then creates a digest of the contract, decrypts Alice's digest with Alice's public key, and compares his digest to Alice's digest. If the digests are identical, then Bob has assurance that the contract was not altered during transmission.

Alice can create a signed digest of the contract with her private key and send the digest to Bob. Bob can then decrypt the digest with Alice's public key.

Alice can create a signed digest with Bob's public key and send the digest and the contract to Bob. Bob then creates a digest of the contract, decrypts Alice's digest with his private key, and compares his digest to Alice's digest. If the digests are identical, then Bob has assurance that the contract was not altered during transmission.

Alice and Bob can agree to use the RSA encryption method to protect the contract.

Save

Question 16 (1 point)

13 (1 point) When using a public key encryption method, the message

Using one of the publicly known secure hash algorithms, a digest is created from a one-page letter. If the size of the digest in bits is compared to the size of the letter in bits,

Question 16 options:

the size of the digest

a comparison cannot be determined since the digest size in bits will be random

the size of the digest > the size of the letter

the size of the digest = the size of the letter

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!