ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 67 - 112-51 discussion

Report
Export

Peter, a security professional, was hired by an organization and was instructed to secure the application and its content from unauthorized access. In this process, Peter implemented a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication.

Which of the following algorithms was employed by Peter in the above scenario?

A.
RSA
Answers
A.
RSA
B.
MD6
Answers
B.
MD6
C.
DSA
Answers
C.
DSA
D.
SHA-2
Answers
D.
SHA-2
Suggested answer: A

Explanation:

RSA is a public-key cryptosystem that uses modular arithmetic and elementary number theory for Internet encryption and user authentication. RSA stands for Rivest-Shamir-Adleman, the names of the inventors of the algorithm. RSA allows users to generate a pair of keys, one public and one private, that are mathematically related. The public key can be used to encrypt messages or verify digital signatures, while the private key can be used to decrypt messages or create digital signatures. RSA is based on the difficulty of factoring large numbers, which makes it secure and widely used12.

Reference: What is Public-Key Cryptosystem in Information Security?, Network Defense Essentials (NDE) | Coursera

asked 18/09/2024
Jana Rutrich
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first