Cryptography Basics

Cryptography Basics

Created by
@PlushArtInformel

Questions and Answers

Asymmetric cryptography uses ______ keys: a private key and a public key.

two

______ key cryptography uses the same key for encryption and decryption.

Symmetric

The receiver's ______ key is used to decrypt the message in asymmetric cryptography.

private

Sender Alice uses the receiver's ______ key to encrypt the message.

<p>public</p> Signup and view all the answers

Network security provides five ______ services.

<p>security</p> Signup and view all the answers

Message ______ ensures that the transmitted message makes sense only to the intended receiver.

<p>confidentiality</p> Signup and view all the answers

Message ______ ensures that the data arrives at the receiver exactly as they were sent.

<p>integrity</p> Signup and view all the answers

______ cryptosystems can be used to achieve message confidentiality.

<p>Symmetric or asymmetric</p> Signup and view all the answers

RSA is an example of ______ key cryptography.

<p>asymmetric</p> Signup and view all the answers

Diffie-Hellman is an example of ______ key cryptography.

<p>asymmetric</p> Signup and view all the answers

More Quizzes Like This

Cryptography Basics
18 questions

Cryptography Basics

PreEminentHeliotrope3988 avatar
PreEminentHeliotrope3988
Cryptography Basics Quiz
30 questions
Data Encryption Standard (DES)
10 questions

Data Encryption Standard (DES)

UndisputableBalalaika avatar
UndisputableBalalaika
Cryptography Chapter 8
8 questions
Use Quizgecko on...
Browser
Browser