Bird
0
0

A developer tries to protect data by doubling the RSA key size from 2048 to 4096 bits, expecting it to be quantum-safe. What is the main problem with this approach?

medium📝 Analysis Q14 of 15
Cybersecurity - Emerging Security Topics
A developer tries to protect data by doubling the RSA key size from 2048 to 4096 bits, expecting it to be quantum-safe. What is the main problem with this approach?
ADoubling key size makes RSA vulnerable to classical attacks
B4096-bit keys are too short for classical security
CQuantum computers can still break RSA efficiently regardless of key size
DRSA keys cannot be doubled in size
Step-by-Step Solution
Solution:
  1. Step 1: Understand quantum impact on RSA key size

    Quantum computers running Shor's algorithm can factor large numbers efficiently, so increasing key size does not stop quantum attacks.
  2. Step 2: Analyze why doubling key size is ineffective

    Doubling RSA key size only increases classical security but does not prevent quantum algorithms from breaking it efficiently.
  3. Final Answer:

    Quantum computers can still break RSA efficiently regardless of key size -> Option C
  4. Quick Check:

    Quantum attacks bypass key size increase [OK]
Quick Trick: Quantum breaks RSA no matter key size [OK]
Common Mistakes:
MISTAKES
  • Thinking bigger keys stop quantum attacks
  • Believing 4096-bit keys are insecure classically
  • Assuming RSA keys cannot be changed

Want More Practice?

15+ quiz questions · All difficulty levels · Free

Free Signup - Practice All Questions
More Cybersecurity Quizzes