Exam 3: Public-Key Cryptography and Message Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A __________ is when the sender "signs" a message with its private key, which is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message.

(Short Answer)
5.0/5
(29)

The private key is known only to its owner.

(True/False)
5.0/5
(33)

In the ECB mode of encryption if an attacker reorders the blocks of ciphertext then each block will still decrypt successfully, however, the reordering may alter the meaning of the overall data sequence.

(True/False)
4.8/5
(33)

Public key algorithms are based on mathematical functions rather than on simple operations on bit patterns.

(True/False)
4.8/5
(35)

Private key encryption is used to produce digital signatures which provide an enhanced form of message authentication.

(True/False)
4.9/5
(29)

As with symmetric encryption, there are two approaches to attacking a secure hash function: brute-force attack and ___________ .

(Short Answer)
4.8/5
(30)

Bob uses his own private key to encrypt the message.When Alice receives the ciphertext she finds that she can decrypt it with Bob's public key, thus proving that the message must have been encrypted by Bob.No one else has Bob's private key and therefore no one else could have created a ciphertext that could be decrypted with Bob's public key.Therefore the entire encrypted message serves as a _________ .

(Short Answer)
4.9/5
(33)

Public key algorithms are useful in the exchange of conventional encryption keys.

(True/False)
4.9/5
(33)

Protection against active attacks (falsification of data and transactions) is known as ___________ .

(Short Answer)
4.8/5
(37)
Showing 21 - 29 of 29
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)