18. What is encrypting a symmetric key using another symmetric key called?
a.
Key transportb.
Key updatec.
Key wrappingd.
Key bundleThe other three choices are not used in key wrapping. Key transport is a key establishment procedure whereby one party (sender) selects and encrypts the keying material and then distributes the material to another party (the receiver). Key update is a function performed on a cryptographic key to compute a new but related key. Key bundle is a set of keys used during one operation, typically a TDEA operation.
19. Which of the following represents the correct order of nodes (from highest to lowest) in a cryptographic key management infrastructure?
1.
Client node2.
User entities3.
Key processing facility4.
Service agenta.
4, 2, 3, and 1b.
3, 4, 1, and 2c.
3, 4, 2, and 1d.
2, 4, 1, and 320. In a cryptographic key management infrastructure, which of the following supports single point-of-access for other nodes?
a.
Key processing facilityb.
User entitiesc.
Client nodesd.
Service agents21. A digital signature is implemented using which of the following cryptographic techniques?
a.
Public key cryptographyb.
Key escrow cryptographyc.
Secret key cryptographyd.
Hybrid cryptographic systemsPublic key crypto-systems make possible authentication schemes in which a secret can be verified without the need to share that secret. In public key cryptography, each user independently generates two mathematically related keys. One is typically made public, so it is referred to as the public key. The other is kept private, so it is referred to as the user’s private key. The public key becomes in effect part of the user’s identity and should be made well known as necessary, like a phone number. Conversely, the private key should be known only to the user because it can be used to prove ownership of the public key and thus the user’s identity. It is computationally infeasible to derive a user’s private key from the corresponding public key, so free distribution of the public key poses no threat to the secrecy of the private key.