Exam 3: Public-Key Cryptography and Message Authentication
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
A __________ is when the sender "signs" a message with its private key, which is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message.
(Short Answer)
5.0/5
(29)
In the ECB mode of encryption if an attacker reorders the blocks of ciphertext then each block will still decrypt successfully, however, the reordering may alter the meaning of the overall data sequence.
(True/False)
4.8/5
(33)
Public key algorithms are based on mathematical functions rather than on simple operations on bit patterns.
(True/False)
4.8/5
(35)
Private key encryption is used to produce digital signatures which provide an enhanced form of message authentication.
(True/False)
4.9/5
(29)
As with symmetric encryption, there are two approaches to attacking a secure hash function: brute-force attack and ___________ .
(Short Answer)
4.8/5
(30)
Bob uses his own private key to encrypt the message.When Alice receives the ciphertext she finds that she can decrypt it with Bob's public key, thus proving that the message must have been encrypted by Bob.No one else has Bob's private key and therefore no one else could have created a ciphertext that could be decrypted with Bob's public key.Therefore the entire encrypted message serves as a _________ .
(Short Answer)
4.9/5
(33)
Public key algorithms are useful in the exchange of conventional encryption keys.
(True/False)
4.9/5
(33)
Protection against active attacks (falsification of data and transactions) is known as ___________ .
(Short Answer)
4.8/5
(37)
Showing 21 - 29 of 29
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)