ICT2213 Applied Cryptography Lecture 11: Key Management (Key Distribution)
17 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of public-key cryptography in key distribution?

  • To distribute secret keys securely between sender and receiver (correct)
  • To create a digital signature
  • To verify the identity of the sender
  • To encrypt the plaintext message
  • What is the purpose of a Public Key Infrastructure (PKI) in cryptography?

  • To encrypt messages using public keys
  • To authenticate users and devices
  • To manage and distribute public keys
  • To create and manage digital certificates (correct)
  • What is the main advantage of the Web-of-Trust model compared to the PKI model?

  • It is more secure
  • It is more user-friendly
  • It does not rely on trusted third parties (correct)
  • It is more scalable
  • What is the purpose of a certificate chain in a PKI system?

    <p>To verify the authenticity of a public key</p> Signup and view all the answers

    What is the main problem with the PKI model mentioned in the text?

    <p>It relies on trusted third parties</p> Signup and view all the answers

    What is the main purpose of symmetric encryption in the context of key management?

    <p>To distribute secret keys securely</p> Signup and view all the answers

    Who can set up a trusted root CA?

    <p>Both profit-making and non-profit organizations</p> Signup and view all the answers

    How do applications like web browsers typically handle root CA certificates?

    <p>By hardcoding a list of presumed trusted root CAs</p> Signup and view all the answers

    Who certifies the public key of a root CA?

    <p>The root CA itself through a self-signed certificate</p> Signup and view all the answers

    What is the main concern regarding trusting root CAs?

    <p>Hardcoded root CAs may not always be trustworthy</p> Signup and view all the answers

    Why is it challenging to fully trust a self-signed certificate from a root CA?

    <p>There is no way to verify the authenticity of a self-signed certificate</p> Signup and view all the answers

    What is the primary purpose of PKI (Public Key Infrastructure) in the context of HTTPS websites?

    <p>To ensure users are visiting authentic and secure websites</p> Signup and view all the answers

    What percentage of phishing websites were reported to be using HTTPS in 2021?

    <p>82%</p> Signup and view all the answers

    In the Web-of-Trust model, how can a public key be certified?

    <p>Both B and C</p> Signup and view all the answers

    What is the potential risk associated with the Web-of-Trust model?

    <p>Careless or malicious users can impact its security</p> Signup and view all the answers

    Which protocol implements the idea of Web-of-Trust for secure communications?

    <p>PGP</p> Signup and view all the answers

    According to the 'Key continuity management' solution, how can a new public key be trusted?

    <p>By trusting public keys that have been in use for a long time</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser