Which of the following is a characteristic of Public Key Infrastructure (PKI)?

Which of the following is a characteristic of Public Key Infrastructure (PKI)?

Which of the following is a characteristic of Public Key Infrastructure (PKI)?

A.
Public-key cryptosystems are faster than symmetric-key cryptosystems.

B.
Public-key cryptosystems distribute public-keys within digital signatures.

C.
Public-key cryptosystems do not require a secure key distribution channel.

D.
Public-key cryptosystems do not provide technical non-repudiation via digital signatures.



Leave a Reply 10

Your email address will not be published. Required fields are marked *


Cosmo

Cosmo

Im not sure about certificate.

I know that PKI use it that way (cert+key), but public key cryptosystems (a.k.a – asymmetric cryptosystems) really DO NOT require any secure key distribution channel. You can give (publish or send in plain) your public key to anyone who wishes to send a secret message to you. Public key REALLY doesn’t need to be keep secret.
(Of course, your private key will never leave your vault.)

The secure channel needed for key delivery is the most important weakness of symmetric cryptosystems, and public key cryptosystems are invented in order to overcome this weakness.

I suggest answer C).

Farce

Farce

Wrong, its B

Joe v

Joe v

B is not really correct since they said ” within “.

Digital signatures is the message hashed then encrypted with the private key. The recipient must obtain the public key from elsewhere to decrypt the hash and verify the message and sender.

The signature does NOT contain a public key… it NEEDS a public key

Joe V

Joe V

Now, if B said digital Certificates… then it would be correct.

From MasterExam:
A digital certificate contains, among other things, the sender’s public key, and can be used to identify the sender.
The digital signature does not contain a copy of the public key.

MasterBlaster

MasterBlaster

I will go with C as well…. Although seeing Miguel went with B… I am Worried 🙂

RoundHatHacker

RoundHatHacker

Don’t worry about Miguel…..he/she is just copying-pasting answers after checking…..not provided any single explanation in last 692 questions…..seems like a bug….a repeater bug.

Anonymous

Anonymous

Yeah, that dude is useless.

dungctt

dungctt

Answer: C
Public-key cryptography is often used to secure electronic communication over an open networked environment such as the internet, without relying on a covert channel even for key exchange. Open networked environments are susceptible to a variety of communication security problems such as man-in-the-middle attacks and other security threats. Security properties required for communication typically include that the communication being sent must not be readable during transit (preserving confidentiality), the communication must not be modified during transit (preserving the integrity of the communication), the communication must originate from an identified party (sender authenticity) and to ensure non-repudiation or non-denial of the sending of the communication. Combining public-key cryptography with an Enveloped Public Key Encryption (EPKE)[3] method, allows for the secure sending of a communication over an open networked environment.
https://en.wikipedia.org/wiki/Public-key_cryptography

None

None

Here says the answer is B
http://www.aiopass4sure.com/ec-council-exams/312-50v8-exam-questions/which-of-the-following-is-a-characteristic-of-public-key-infrastructure-pki.html

Here says the answer is B
http://www.certbibles.com/latest-eccouncil-312-50v8-real-exam-download-341-350.html?upm_export=pdf

Here says the answer is B
http://pass4examination.blogspot.com.es/2014/05/latest-eccouncil-312-50v8-real-exam_8381.html

If any link doesn’t work just type on google the question with double quotes.

Why are you guys so sure the correct answer FOR EC-COUNCIL is C?