Appendix B
Answers to Review Questions
Chapter 1: Cryptographic Tools and Techniques
1. B. Symmetric encryption offers privacy as a feature but suffers from problems with key distribution and key management.
2. C. The MD algorithms are a series of cryptographic algorithms that were developed by Ron Rivest. MD5 processes a variable-size input and produces a fixed 128-bit output.
3. B. A digital signature is a hash value that has been encrypted with the private key of the sender. It is used for authentication and integrity.
4. C. The easiest way to check to see if the lost key has been flagged by the system is to use the online certificate to check the status of the certificate.
5. D. A certificate revocation list is where revoked certificates ...