
Concept explainers
The main characteristic of the Public Key Infrastructure (ICP) – or Public Key Infrastructure (PKI) – is that it uses a pair of keys, public and private, to provide the underlying security services. Regarding aspects related to the security of a cryptographic system, analyze the following statements.
I. Typically, what compromises the security of a cryptographic model has less to do with the design of that model and more to do with poor key management.
II. Private keys must remain secret from all parties involved, throughout their lifecycle, including the owners of those keys, which is why they are also called secret keys.
III. Because public keys are in the open domain they can be tampered with, there is no guarantee that a public key is correct. The infrastructure by which they are managed must be trusted.
IV. A public key infrastructure (or Public Key Infrastructure - PKI) guarantees some aspects related to the life cycle of a public key, such as generation, installation and storage. However, aspects external to the Administrator are not guaranteed, such as: its use, distribution and destruction.
Only the following items are correct:
A) I e II
B) I e III
C) I e IV
D) II e III
E) III e IV

Step by stepSolved in 2 steps

- Describe the terms “plaintext,” “ciphertext,” and “secret key” as they apply to symmetric encryption Cryptographic systems are characterized along three independent dimensions. What are these three dimensions? The term “strong encryption” refers to encryption schemes that make it impractical for unauthorized persons to gain access to plaintext that has been encrypted. What properties are characteristic of a strong encryption algorithm?arrow_forwardIn its infancy, cryptography based on public keys struggled to overcome the difficulty of key distribution. Why not provide an example to illustrate how the distribution of keys might be carried out such that it is clear and simple?arrow_forwardDescribe the difference between symmetric-key cryptography and public-key cryptography. Relate your discussion to the notion of ‘keys’, and also explain scenarios in which symmetric-key cryptography is better suited, and scenarios in which public-key cryptography is better suited.arrow_forward
- The security of asymmetric ciphers is based on the asymmetric operations, meaning operations that can not be easily reversed. What kind of asymmetric operations have you learned from this chapter? Can you propose some asymmetric operations?arrow_forwardExplain the difference between a secure cipher, a CPA-secure cipher, and a CCA-secure cipher. Under what conditions do we need i) CPA security? ii) CCA security?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





