Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 212-81 Topic 12 Question 27 Discussion

Actual exam question for Eccouncil's 212-81 exam
Question #: 27
Topic #: 12
[All 212-81 Questions]

In 1977 researchers and MIT described what asymmetric algorithm?

Show Suggested Answer Hide Answer
Suggested Answer: A

Public keys

https://en.wikipedia.org/wiki/Public-key_cryptography

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security.

In such a system, any person can encrypt a message using the receiver's public key, but that encrypted message can only be decrypted with the receiver's private key.

Alice and Bob have two keys of their own --- just to be clear, that's four keys total. Each party has their own public key, which they share with the world, and their own private key which they well, which they keep private, of course but, more than that, which they keep as a closely guarded secret. The magic of public key cryptography is that a message encrypted with the public key can only be decrypted with the private key. Alice will encrypt her message with Bob's public key, and even though Eve knows she used Bob's public key, and even though Eve knows Bob's public key herself, she is unable to decrypt the message. Only Bob, using his secret key, can decrypt the message assuming he's kept it secret, of course.

Alice and Bob do not need to plan anything ahead of time to communicate securely: they generate their public-private key pairs independently, and happily broadcast their public keys to the world at large. Alice can rest assured that only Bob can decrypt the message she sends because she has encrypted it with his public key.


Contribute your Thoughts:

Noel
1 months ago
Hmm, I hope the correct answer isn't 'all of the above' - that would just be RSA-lly confusing!
upvoted 0 times
Margart
1 days ago
C) AES
upvoted 0 times
...
Shannan
24 days ago
B) RSA
upvoted 0 times
...
Shaniqua
28 days ago
A) DH
upvoted 0 times
...
...
Daren
1 months ago
If this is a crypto exam, I bet the instructor is a real bEASt when it comes to tricky questions.
upvoted 0 times
...
Major
2 months ago
Elliptic Curve cryptography, EC, that's the one! It's the cool new kid on the block.
upvoted 0 times
Blair
19 days ago
I think you're mistaken, it was actually the DH algorithm that was described in 1977.
upvoted 0 times
...
Dominic
22 days ago
RSA is actually the asymmetric algorithm described by researchers and MIT in 1977.
upvoted 0 times
...
...
Venita
2 months ago
AES? Really? That's a symmetric algorithm, not asymmetric. What were they thinking with that one?
upvoted 0 times
...
Samuel
2 months ago
Hold on, wasn't RSA developed a bit later? I'm pretty sure the answer is DH, the Diffie-Hellman key exchange.
upvoted 0 times
...
Alise
2 months ago
RSA, definitely RSA! That's the classic asymmetric algorithm from 1977.
upvoted 0 times
Dolores
1 days ago
AES is a symmetric algorithm, RSA is the asymmetric one from 1977.
upvoted 0 times
...
Johnetta
9 days ago
DH is a good option, but RSA is the one from 1977.
upvoted 0 times
...
Rodolfo
16 days ago
RSA is definitely a classic asymmetric algorithm.
upvoted 0 times
...
Candra
24 days ago
I agree, RSA is the one described by researchers and MIT in 1977.
upvoted 0 times
...
...
Kayleigh
2 months ago
I'm not sure, but I think DH could also be a possible answer.
upvoted 0 times
...
Joanne
2 months ago
I agree with Nakita, RSA is the correct answer.
upvoted 0 times
...
Nakita
2 months ago
I think the answer is RSA.
upvoted 0 times
...

Save Cancel