Questions
Introduction to Security and Forensic Technologies (CT046-3-1-ISFT-25-RESIT)
Single choice
Which cryptographic algorithm is widely used in PKI encryption?
Options
A.a. RSA (Rivest-Shamir-Adleman)
B.b. SHA-256 (Secure Hash Algorithm 256-bit)
C.c. AES (Advanced Encryption Standard)
D.d. SHA-512 (Secure Hash Algorithm 512-bit)

View Explanation
Verified Answer
Please login to view
Step-by-Step Analysis
To begin, let’s identify what PKI encryption typically relies on. PKI (Public Key Infrastructure) primarily uses public-key cryptography to enable secure key exchange, digital signatures, and certificate-based authentication.
Option a: a. RSA (Rivest-Shamir-Adleman). This is the classic public-key algorithm widely......Login to view full explanationLog in for full answers
We've collected over 50,000 authentic exam questions and detailed explanations from around the globe. Log in now and get instant access to the answers!
Similar Questions
Foo wants to send a confidential message to Yeh Lih over an insecure network. Which cryptographic technique should Foo use?
Blank ______ key encryption uses two keys: a public key that everyone can have and a private key for only the recipient.
(CISA exam, adapted) To ensure confidentiality in an asymmetric-key encryption system, knowledge of which of the following keys is required to decrypt the received message?
Suppose Alice encrypted a message using Bob's public key and sent it to Bob. If an attacker was able to intercept Alice-Bob message, which of the following can be compromised:
More Practical Tools for Students Powered by AI Study Helper
Making Your Study Simpler
Join us and instantly unlock extensive past papers & exclusive solutions to get a head start on your studies!