0
0
Cybersecurityknowledge~10 mins

Asymmetric encryption (RSA, ECC) in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to describe asymmetric encryption.

Cybersecurity
In asymmetric encryption, the [1] key is used to encrypt data.
Drag options to blanks, or click blank then click option'
Aprivate
Bpublic
Cshared
Dsecret
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing the private key as the one used for encryption.
Thinking both keys are the same.
2fill in blank
medium

Complete the sentence to explain RSA key generation.

Cybersecurity
RSA key generation involves selecting two large [1] numbers.
Drag options to blanks, or click blank then click option'
Aprime
Beven
Ccomposite
Drandom
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing composite numbers instead of prime numbers.
Assuming any random number can be used.
3fill in blank
hard

Fix the error in the explanation of ECC.

Cybersecurity
ECC uses [1] curves over finite fields for encryption.
Drag options to blanks, or click blank then click option'
Aelliptic
Bcircular
Cparabolic
Dlinear
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing elliptic with circular or linear curves.
Not knowing the type of curve ECC uses.
4fill in blank
hard

Fill both blanks to complete the description of asymmetric encryption keys.

Cybersecurity
The [1] key is kept secret, while the [2] key is shared publicly.
Drag options to blanks, or click blank then click option'
Aprivate
Bpublic
Cshared
Dencrypted
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing up which key is public and which is private.
Thinking both keys are shared.
5fill in blank
hard

Fill all three blanks to complete the RSA encryption formula.

Cybersecurity
Ciphertext = (Plaintext [1] PublicKey) [2] Modulus; Decryption uses [3] key.
Drag options to blanks, or click blank then click option'
Araised to the power of
Bmod
Cprivate
Dmultiplied by
Attempts:
3 left
💡 Hint
Common Mistakes
Using multiplication instead of exponentiation.
Confusing which key is used for decryption.