Exam 3: Public-Key Cryptography and Message Authentication
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
The two most widely used public key algorithms are RSA and _________ .
Free
(Short Answer)
4.8/5
(39)
Correct Answer:
Diffie-Hellman
The key exchange protocol is vulnerable to a man-in-the-middle attack because it does not authenticate the participants.
Free
(True/False)
4.8/5
(32)
Correct Answer:
True
The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms.
Free
(True/False)
4.9/5
(27)
Correct Answer:
False
The __________ approach has two advantages: it provides a digital signature as well as message authentication and it does not require the distribution of keys to communicating parties.
(Short Answer)
4.8/5
(37)
In addition to providing authentication, a message digest also provides data integrity and performs the same function as a frame check sequence.
(True/False)
4.8/5
(29)
The key algorithmic ingredients of __________ are the AES encryption algorithm, the CTR mode of operation, and the CMAC authentication algorithm.
(Short Answer)
4.8/5
(36)
Using an algorithm that is designed to provide only the digital signature function, the _________ makes use of the SHA-1 and cannot be used for encryption or key exchange.
(Short Answer)
4.8/5
(29)
The __________ algorithm accepts the ciphertext and the matching key and produces the original plaintext.
(Short Answer)
4.7/5
(39)
The __________ property is the "one-way" property and is important if the authentication technique involves the use of a secret value.
(Short Answer)
4.8/5
(40)
The _________ was developed by NIST and published as a federal information processing standard in 1993.
(Short Answer)
4.9/5
(38)
The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.
(True/False)
4.9/5
(38)
Like the MAC, a __________ accepts a variable size message M as input and produces a fixed size message digest H(M) as output.Unlike the MAC, it does not take a secret key as input.
(Short Answer)
4.8/5
(27)
The two important aspects of encryption are to verify that the contents of the message have not been altered and that the source is authentic.
(True/False)
4.8/5
(43)
Message encryption alone provides a secure form of authentication.
(True/False)
4.8/5
(33)
Because of the mathematical properties of the message authentication code function it is less vulnerable to being broken than encryption.
(True/False)
4.9/5
(34)
A _________ is when two sides cooperate to exchange a session key.
(Short Answer)
4.9/5
(37)
The main advantage of HMAC over other proposed hash based schemes is that HMAC can be proven secure, provided that the embedded hash function has some reasonable cryptographic strengths.
(True/False)
4.8/5
(40)
The __________ property guarantees that it is impossible to find an alternative message with the same hash value as a given message, thus preventing forgery when an encrypted hash code is used.
(Short Answer)
4.8/5
(30)
__________ is a term used to describe encryption systems that simultaneously protect confidentiality and authenticity (integrity) of communications.
(Short Answer)
4.8/5
(28)
Cryptographic hash functions generally execute slower in software than conventional encryption algorithms such as DES.
(True/False)
4.8/5
(30)
Showing 1 - 20 of 29
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)