Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Appendix B: Answers to Review Questions

Appendix B

Answers to Review Questions

Chapter 1: Cryptographic Tools and Techniques

1. B. Symmetric encryption offers privacy as a feature but suffers from problems with key distribution and key management.

2. C. The MD algorithms are a series of cryptographic algorithms that were developed by Ron Rivest. MD5 processes a variable-size input and produces a fixed 128-bit output.

3. B. A digital signature is a hash value that has been encrypted with the private key of the sender. It is used for authentication and integrity.

4. C. The easiest way to check to see if the lost key has been flagged by the system is to use the online certificate to check the status of the certificate.

5. D. A certificate revocation list is where revoked certificates are listed.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint