Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 338 discussion

Actual exam question from ISC's CISSP
Question #: 338
Topic #: 1
[All CISSP Questions]

Which algorithm gets its security from the difficulty of calculating discrete logarithms in a finite field and is used to distribute keys, but cannot be used to encrypt or decrypt messages?

  • A. Kerberos
  • B. Digital Signature Algorithm (DSA)
  • C. Diffie-Hellman
  • D. Rivest-Shamir-Adleman (RSA)
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
kasiya
Highly Voted 2 years, 2 months ago
Selected Answer: C
C. Diffie-Hellman
upvoted 7 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
GuardianAngel
Most Recent 9 months, 3 weeks ago
Kerberos creates ticket granting tickets, it does not exchange keys. DSA and RSA are encryption algorhythms. Diffie-Hellman exchanges keys, but has to use another mechanism for the actual encryption. Second link below shows actual code to implement Diffie Hellman and use AES for the actual encryption. https://www.techtarget.com/searchsecurity/definition/Diffie-Hellman-key-exchange https://8thlight.com/insights/create-end-to-end-encryption-using-the-diffie-hellman-key-exchange
upvoted 1 times
...
Soleandheel
11 months, 2 weeks ago
C. Diffie-Hellman The security of the Diffie-Hellman algorithm relies on the mathematical problem of calculating discrete logarithms in a finite field. In simple terms, it's computationally difficult to determine the secret key even if you know the public parameters exchanged during the protocol. The security of the Diffie-Hellman key exchange relies on the difficulty of calculating discrete logarithms, which is considered a hard mathematical problem. This makes it infeasible for an eavesdropper to deduce the shared secret key from the exchanged public keys. It's important to note that while Diffie-Hellman is excellent for securely exchanging keys, it doesn't provide encryption or decryption of messages itself.
upvoted 2 times
...
HughJassole
1 year, 5 months ago
B. Digital Signature Algorithm (DSA) "It functions on the framework of modular exponentiation and discrete logarithmic problems" It provides authentication, integrity, and non-repudiation. NOT encryption, which would be confidentiality https://www.simplilearn.com/tutorials/cryptography-tutorial/digital-signature-algorithm Diffie-Hellman does encrypt: "DH enables the two to use a public key to encrypt and decrypt their conversation or data using symmetric cryptography." https://www.hypr.com/security-encyclopedia/diffie-hellman-algorithim The question wanted the algorithm that does NOT encrypt, hence DSA.
upvoted 1 times
...
Dee83
1 year, 10 months ago
C. Diffie-Hellman.
upvoted 2 times
...
oudmaster
1 year, 11 months ago
Selected Answer: C
CISSP All-in-One Guide: The Diffie-Hellman algorithm enables two systems to generate a symmetric key securely without requiring a previous relationship or prior arrangements. The algorithm allows for key distribution, but does not provide encryption or digital signature functionality. The algorithm is based on the difficulty of calculating discrete logarithms in a finite field.
upvoted 4 times
...
Ivanchun
1 year, 11 months ago
Selected Answer: D
Not sure Y the model answer is A
upvoted 1 times
...
Jamati
2 years ago
Selected Answer: C
It's Diffie-Hellman
upvoted 2 times
...
johnywolker
2 years, 1 month ago
Selected Answer: A
he Diffie-Hellman algorithm is mostly used for key exchange. Although symmetric key algorithms are fast and secure, key exchange is always a problem. You have to figure out a way to get the private key to all systems
upvoted 1 times
...
qwertyuiop1
2 years, 1 month ago
Selected Answer: C
C. Diffie-Hellman
upvoted 3 times
...
Yanjun
2 years, 2 months ago
Selected Answer: C
it should be DH
upvoted 3 times
...
stickerbush1970
2 years, 2 months ago
Selected Answer: C
I am going with DH.
upvoted 4 times
...
Cww1
2 years, 2 months ago
Def C here
upvoted 4 times
GregP
2 years, 2 months ago
The diffie-hellman key exchange uses discrete logarithms and prime numbers to secure
upvoted 4 times
...
...
Loveguitar
2 years, 2 months ago
What, This is definitely RSA
upvoted 1 times
Yanjun
2 years, 2 months ago
RSA can be used to encrypt and decrypt messages
upvoted 1 times
...
...
GregP
2 years, 2 months ago
isnt it Diffie-Helman ? with discrete logarithms
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...