Florian and Tobias would like to begin communicating using a symmetric cryptosystem

.docx
School
Kenyatta Uninersity Kitui Campus**We aren't endorsed by this school
Course
MATH 400
Subject
Information Systems
Date
Jan 11, 2025
Pages
2
Uploaded by ChefWorld15854
Florian and Tobias would like to begin communicating using a symmetric cryptosystem, but they have no prearranged secret and are not able to meet in person to exchange keys. What algorithm can they use to securely exchange the secret key?Diffie-HellmanMD5RSAIDEABlowfishDiffie-HellmanWhich one of the following is not one of the basic requirements for a cryptographic hash function?The function must work on fixed-length input.The function must be relatively easy to compute for any input.The function must be one way.The function must be collision free.The function must work on fixed-length inputWhat standard governs the creation and validation of digital certificates for use in a public key infrastructure?X.509TLSSSLXMLX.509Howard is choosing a cryptographic algorithm for his organization, and he would like to choose an algorithm that supports the creation of digital signatures. Which one of the following algorithms would meet his requirement?BlowfishRSADiffie-HellmanAESDESRSA
Background image
In Transport Layer Security, what type of key is used to encrypt the actual content of communications between a web server and a client?Session keyServer's private keyClient's private keyClient's public keyServer's public keySession KeyChris is designing a cryptographic system for use within his company. The company has 1,000 employees, and they plan to use an asymmetric encryption system. How many total keys will they need?5001000200049502000Alison is examining a digital certificate presented to her by her bank's website. Which one of the following requirements is not necessary for her to trust the digital certificate?She trusts the CA.She knows that the server belongs to the bank.She verifies that the certificate is not listed on a CRL.She verifies the digital signature on the certificate.She knows that the server belo
Background image