PrepAway - Latest Free Exam Questions & Answers

Which of the following keys are used by the symmetric key algorithm?

Which of the following keys are used by the symmetric key algorithm? Each correct answer represents a complete solution. Choose all that apply.

PrepAway - Latest Free Exam Questions & Answers

A.
Group Temporal Key

B.
Pairwise Transient Key

C.
Private Key

D.
Public Key

Explanation:
Private keys are used by the symmetric key algorithm.
What is private key?
In cryptography, a private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. In traditional secret key cryptography, a key would be shared by the communicators so that each could encrypt and decrypt messages. Answer option D is incorrect. A Public Key is known commonly to everybody. It is used to encrypt data. Only specific users can decrypt it. Data encryption is used to encrypt data so that it can only be decrypted with the corresponding private key owned by the public key owner. The public key is also used to verify digital signatures. This signature is created by the associated private key. Answer option B is incorrect. Pairwise Transient Key (PTK) is a 64-byte key that comprises the following:
16 bytes of EAPOL-Key Confirmation Key (KCK): This key is used to compute MIC on WPA EAPOL Key message. 16 bytes of EAPOL-Key Encryption Key (KEK): AP uses this key to encrypt additional data sent (in the ‘Key Data’ field) to the client. 16 bytes of Temporal Key (TK): This key is used to encrypt/decrypt unicast data packets.
8 bytes of Michael MIC Authenticator Tx Key: This key is used to compute MIC on unicast data packets transmitted by the AP. 8 bytes of Michael MIC Authenticator Rx Key: This key is used to compute MIC on unicast data packets transmitted by the station.Pairwise Transient Key is derived from the pairwise master key (PMK), Authenticator address (AA), Supplicant address (SPA), Authenticator
nonce (A Nonce), and Supplicant nonce (S Nonce) using pseudo-random function (PRF). Answer option A is incorrect. Group Temporal Key (GTK) is a random value that is assigned by the broadcast/multicast source. It is used to protect broadcast/multicast medium access control (MAC) protocol data units. It is derived from a group master key (GMK).

One Comment on “Which of the following keys are used by the symmetric key algorithm?


Leave a Reply