{"id":687,"date":"2021-01-17T05:37:57","date_gmt":"2021-01-16T18:04:19","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0679\/"},"modified":"2021-01-17T05:44:33","modified_gmt":"2021-01-17T05:44:33","slug":"systems-security-certified-practitioner-sscp-question0679","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0679\/","title":{"rendered":"Systems Security Certified Practitioner &#8211; SSCP &#8211; Question0679"},"content":{"rendered":"<div class=\"question\">A public key algorithm that does both encryption and digital signature is which of the following? <br \/><strong><br \/>A.<\/strong> RSA <br \/><strong>B.<\/strong> DES <br \/><strong>C.<\/strong> IDEA <br \/><strong>D.<\/strong> Diffie-Hellman<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nRSA can be used for encryption, key exchange, and digital signatures. Key Exchange versus key Agreement<br \/>\nKEY EXCHANGE Key exchange (also known as &#8220;key establishment&#8221;) is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm.<br \/>\nIf sender and receiver wish to exchange encrypted messages, each must be equipped to encrypt messages to be sent and decrypt messages received. The nature of the equipping they require depends on the encryption technique they might use. If they use a code, both will require a copy of the same codebook. If they use a cipher, they will need appropriate keys. If the cipher is a symmetric key cipher, both will need a copy of the same key. If an asymmetric key cipher with the public\/private key property, both will need the other&#8217;s public key.<br \/>\nKEY AGREEMENT Diffie-Hellman is a key agreement algorithm used by two parties to agree on a shared secret. The Diffie Hellman (DH) key agreement algorithm describes a means for two parties to agree upon a shared secret over a public network in such a way that the secret will be unavailable to eavesdroppers. The DH algorithm converts the shared secret into an arbitrary amount of keying material. The resulting keying material is used as a symmetric encryption key.<br \/>\nThe other answers are not correct because: DES and IDEA are both symmetric algorithms. Diffie-Hellman is a common asymmetric algorithm, but is used only for key agreement. It is not typically used for data encryption and does not have digital signature capability.<br \/>\nReferences: <a href=\"http:\/\/tools.ietf.org\/html\/rfc2631\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/tools.ietf.org\/html\/rfc2631<\/a> For Diffie-Hellman information: <a href=\"http:\/\/www.netip.com\/articles\/keith\/diffie-helman.htm\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/www.netip.com\/articles\/keith\/diffie-helman.htm<\/a><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>A public key algorithm that does both encryption and digital signature is which of the following? A. RSA B. DES C. IDEA D. Diffie-Hellman Show Answer Hide Answer Correct Answer: A Explanation: RSA can be used for encryption, key exchange, and digital signatures. Key Exchange versus key Agreement KEY EXCHANGE Key exchange (also known as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[1078,682,3],"class_list":["post-687","post","type-post","status-publish","format-standard","hentry","category-systems-security-certified-practitioner-sscp","tag-choices","tag-question-0679","tag-systems-security-certified-practitioner-sscp"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/comments?post=687"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/687\/revisions"}],"predecessor-version":[{"id":1763,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/687\/revisions\/1763"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/media?parent=687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/categories?post=687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/tags?post=687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}