# Review Question.

Nishesh.Prasad
Member Posts:

**185**
1. Assuming that Asymmetric Encryption is in place, if a message is encoded using the number 5, what will you use to decode it ?

a. 5

b. 1

c. 0

d. 1/5

*** can anyone point out the Answer with an explanation. Thanks.

a. 5

b. 1

c. 0

d. 1/5

*** can anyone point out the Answer with an explanation. Thanks.

MCITP: EA 2008| VCP4| MCSE 2003 | CCNA | MCSA 2003: Security | MCDST | Security+ | ITILV3

#### Categories

- 111.7K All Categories
- 330 Welcome Center
- 70 Announcements
- 6 Forum Rules of Engagement
- 187 Introduce Yourself
- 51 TechExams Support
- 88.6K Certification Preparation
- 131 Check Point: CCSA & CCSE
- 32.9K Cisco
- 21.6K CCNA & CCENT
- 370 CCDA & CCDP
- 9K CCNP
- 7 Cisco CyberOps
- 1.7K CCIE
- 527 Cloud Certifications
- 192 Amazon Web Services (AWS)
- 36 Azure
- 119 CCSP
- 78 Cloud+ & Cloud Essentials
- 15.5K CompTIA
- 5K A+
- 244 CASP+
- 113 CySA+
- 973 Linux+
- 4.4K Network+
- 34 PenTest+
- 266 Project+
- 3.9K Security+
- 332 Server+
- 251 Other CompTIA Certifications
- 1.2K EC-Council
- 586 CHFI
- 625 CEH
- 1.4K GIAC
- 46 IAPP
- 1K ISACA
- 27 CRISC
- 284 CISA
- 706 CISM
- 4.3K (ISC)²
- 660 CISSP
- 35 CSSLP
- 3.6K SSCP
- 926 Juniper
- 736 LPI, Red Hat & Linux Foundation
- 18.6K Microsoft
- 150 MCSA 2016 / MCSE 2016
- 161 Windows 10 exams
- 139 Windows 8 exams
- 1.4K Windows 7 exams
- 1.6K MCSA / MCSE on Windows 2012 General
- 2.3K MCTS / MCITP on Windows 2008 General
- 828 Exchange Server & Office Communications Server Exams
- 536 Other Microsoft Electives
- 349 MCSA/MCSE: Security
- 300 Microsoft Developers Certifications
- 485 SQL Server exams
- 160 Offensive Security: OSCP & OSCE
- 2K Other Security Certifications
- 345 Virtualization Certifications
- 231 Citrix Certifications
- 104 VMware
- 1.9K Other Certifications
- 14 Business Analyst Certifications
- 391 CWNP Certifications
- 873 ITIL Certifications
- 220 Project Management Certifications
- 85 Apple Mac OS X Certifications
- 62 Novell Certification
- 81 Oracle Certifications
- 52 Sun Microsystems Java Certification
- 113 Storage Certifications
- 6.7K General Certification
- 17.9K Education & Development
- 63 Colleges & Schools
- 88 Educational Resources
- 17.7K IT Jobs / Degrees
- 66 Professional Development
- 359 Cybersecurity
- 19 Auditing & Compliance
- 16 Cloud Security & IoT
- 14 Cryptography & PKI
- 36 Cybersecurity Management
- 5 Data Science & Machine Learning
- 9 Forensics
- 9 ICS/SCADA Security
- 25 Incident Response
- 7 Linux Security
- 11 OWASP
- 32 Pentesting
- 41 Security Awareness & Training
- 52 Security News & Breaches
- 10 Windows Security
- 20.1K General
- 31 Conferences & Events
- 21 Computer Gaming
- 7 Data Center
- 81 Classifieds
- 49 For Sale
- 6 Wanted (ISO)
- 16 Help Wanted
- 16 Just for Fun
- 14 Networking
- 17.5K Off-Topic
- 20 Scripting
- Show Us Your Tech!
- 20 Troubleshooting
- 2.4K Virtualization

## Comments

8■□□□□□□□□□based purely on best answer available with info given 1/5 for asymmetric

5 would be the answer for symmetric and would be a much better question.

In reality it would be based on the function of the algorithm and you could write a algorithm to use any one of those numbers to decrypt although 0 or 1 would seem unlikely as almost any number passed through it would decrypt and 5 would be symmetric.

Their logic seems to be that they use a private key value of 5 and the algo applies the same function used to encrypt to decrypt such as simple multiplication. If you multiply at both ends then the public key value of 1/5 brings back the value to 1.

You could have an algo that divides by the public key but then both values would be indentical which basically would reduce PKI to a shared secret.

You can write an algo that would decrypt with anyone of the answers provided so it is a bad question with the BEST answer being 1/5

PS. Be careful when studying practice test as anyone can create one and give an answer that is completely wrong which mine could possibly be above. I have seen the same questions on multiple practice exams all with a different answers in the key so make sure you understand the question and can back up your reasoning with information that you have learned and not simply spit out an answer that you see that someone else has given. I see that you are doing that by requesting the reasoning behind it.

1858■□□□□□□□□□Rivest Shamir Adleman (RSA) Uses a specific one-way function based on the difficulty of factoring N, a product of two large prime numbers (200 digits).

Diffie-Hellman Key Exchange Uses two system parameters (p and g).

• p is a prime number.

• g is an integer smaller than p generated by both parties.

El Gamal Extends Diffie-Hellman for use in encryption and digital signatures.

Elliptic Curve (EC) • Used in conjunction with other methods to reduce the key size.

• An elliptic curve key of 160 bits is equivalent to 1024-bit RSA key, which means less computational power and memory requirements.

• Suitable for hardware applications (e.g.: smart cards and wireless devices).