Question 8 (1 point)
Public key cryptography relies on which of the following?
Diffie-Hellman key exchange
The difficulty of the cryptographic algorithm to break it
Keeping the public key accessible via a key server
Special mathematical functions that are very difficult to break without the private key
Question 9 (1 point)
Which of the following is an example of a protocol that ensures communications are private through the use of
symmetric encryption algorithms?
Feistel
PGP
AES
DES
Question 10 (1 point)
The X.509 standard was issued by the:
International Telecommunications Union (ITU).
Open Systems Interconnection (OSI).
O O O O
Institute of Electrical and Electronics Engineers (IEEE).
International Standards Organization (ISO).



Answer :

Question 8: Public key cryptography relies on: 1. Diffie-Hellman key exchange: This is a method where two parties can securely agree on a shared secret key without having to directly share it over an insecure channel. It allows for secure communication by establishing a shared secret key that can be used for encryption and decryption. 2. Special mathematical functions that are very difficult to break without the private key: Public key cryptography involves complex mathematical functions that are easy to perform in one direction (encryption) but computationally difficult to reverse without the private key (decryption). This asymmetry forms the basis of secure communication using public and private keys. Question 9: An example of a protocol that ensures communications are private through the use of symmetric encryption algorithms is: - AES (Advanced Encryption Standard): AES is a widely used symmetric encryption algorithm that ensures confidentiality and privacy of data by using a shared secret key to encrypt and decrypt messages. It is considered secure and efficient for protecting sensitive information during communication. Question 10: The X.509 standard was issued by the: - International Telecommunications Union (ITU): The X.509 standard, which defines the format for public key certificates, was issued by the ITU. These certificates are used in public key infrastructure (PKI) to verify the authenticity of entities, such as websites or individuals, by binding their public key to their identity.