Computer Networks » Public Key Cryptography
What are the two keys that are used in asymmetric key cryptography?
A. Secret key and private key
B. Private key and public key
C. Public key and secured key
D. Secured key and private key
Read more about this MCQ
Who are three discoverers of the RSA algorithm in public key cryptography?
A. Rivest, shamir, aldleman
B. Routest, shamir, adem
C. Robert, shamuel, alice
D. Radmir, shadhur, alice
Read more about this MCQ
What is the first public key cryptography algorithm?
A. Rsa algorithm
B. Aes algorithm
C. 3des algorithm
D. Knapsack algorithm
Read more about this MCQ
Which of the following is not a property of public key cryptography?
A. Uses different keys
B. Every user has a unique private key
C. Public key can be same for number of users
D. Cannot deduce private key from public key
Read more about this MCQ
What are the types in schemes of public key encryption?
A. Rsa, eigamal, elliptic curve cryptography
B. Elliptic curve, rsa
C. Rsa, eigamal
D. Eigmal, rsa
Read more about this MCQ
Which of the following is correct about RSA scheme in public key cryptography?
A. It is efficient for decryption
B. Lengthy keys are required for more security
C. It is not efficient for encryption
D. It is not popular
Read more about this MCQ
Which of the following doesn’t match as a property of elliptic curve cryptography?
A. Used over rsa
B. Uses elliptic curve theory
C. Key length is larger than rsa
D. Uses discrete logarithms
Read more about this MCQ
Which of the following is the disadvantage of asymmetric cryptography?
A. No need of key distribution
B. Security
C. Using digital signatures
D. Used to decrypt small messages
Read more about this MCQ