PrepAway - Latest Free Exam Questions & Answers

Which of the following is a characteristic of Public Key Infrastructure (PKI)?

Which of the following is a characteristic of Public Key Infrastructure (PKI)?

PrepAway - Latest Free Exam Questions & Answers

A.
Public-key cryptosystems are faster than symmetric-key cryptosystems.

B.
Public-key cryptosystems distribute public-keys within digital signatures.

C.
Public-key cryptosystems do not require a secure key distribution channel.

D.
Public-key cryptosystems do not provide technical non-repudiation via digital signatures.

9 Comments on “Which of the following is a characteristic of Public Key Infrastructure (PKI)?

  1. Cosmo says:

    Im not sure about certificate.

    I know that PKI use it that way (cert+key), but public key cryptosystems (a.k.a – asymmetric cryptosystems) really DO NOT require any secure key distribution channel. You can give (publish or send in plain) your public key to anyone who wishes to send a secret message to you. Public key REALLY doesn’t need to be keep secret.
    (Of course, your private key will never leave your vault.)

    The secure channel needed for key delivery is the most important weakness of symmetric cryptosystems, and public key cryptosystems are invented in order to overcome this weakness.

    I suggest answer C).

  2. Joe v says:

    B is not really correct since they said ” within “.

    Digital signatures is the message hashed then encrypted with the private key. The recipient must obtain the public key from elsewhere to decrypt the hash and verify the message and sender.

    The signature does NOT contain a public key… it NEEDS a public key

  3. Joe V says:

    Now, if B said digital Certificates… then it would be correct.

    From MasterExam:
    A digital certificate contains, among other things, the sender’s public key, and can be used to identify the sender.
    The digital signature does not contain a copy of the public key.

  4. RoundHatHacker says:

    Don’t worry about Miguel…..he/she is just copying-pasting answers after checking…..not provided any single explanation in last 692 questions…..seems like a bug….a repeater bug.

  5. dungctt says:

    Answer: C
    Public-key cryptography is often used to secure electronic communication over an open networked environment such as the internet, without relying on a covert channel even for key exchange. Open networked environments are susceptible to a variety of communication security problems such as man-in-the-middle attacks and other security threats. Security properties required for communication typically include that the communication being sent must not be readable during transit (preserving confidentiality), the communication must not be modified during transit (preserving the integrity of the communication), the communication must originate from an identified party (sender authenticity) and to ensure non-repudiation or non-denial of the sending of the communication. Combining public-key cryptography with an Enveloped Public Key Encryption (EPKE)[3] method, allows for the secure sending of a communication over an open networked environment.
    https://en.wikipedia.org/wiki/Public-key_cryptography


Leave a Reply