Q1: Why Asymmetric key cryptography alone cannot resolve Internet security issue? Please assess the following statements and give your reasons: o Encryption in symmetric key cryptography provides authentication. o Encryption in asymmetric key cryptography provides authentication.
Q2: NSA prefers exportable security algorithms easier to break or harder to break?
Q3: To achieve the same level of security, which one need to use a larger key size? Symmetric key cryptography or asymmetric key cryptography? Please explain your assessment.
Q4: Symmetric key cryptography and asymmetric key cryptography are complimentary. Please explain why and how?
Q5: What are the principal ingredients of a public-key cryptosystem?
Q6: List and briefly define three uses of a public-key cryptosystem?
Q7: What is the difference between a private key and a secret key?
Q8: How can public-key encryption be used to distribute a secret key?