Exam 13: Digital Signatures

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

the DSS approach makes use of a hash function.

Free
(True/False)
4.7/5
(40)
Correct Answer:
Verified

True

the global public key components of DSA are the same as for the Schnorr signature scheme.

Free
(True/False)
4.8/5
(30)
Correct Answer:
Verified

True

the __________ scheme minimizes the message dependent amount of computation required to generate a signature.

Free
(Short Answer)
4.9/5
(30)
Correct Answer:
Verified

Schnorr

the __________ scheme minimizes the message dependent amount of computation required to generate a signature.

(Multiple Choice)
4.7/5
(33)

Administrative controls relating to the security of private keys can be employed by including a ____________ (which includes date and time) and to require prompt reporting of compromised keys to a central authority.

(Short Answer)
4.9/5
(28)

the Schnorr signature scheme is based on discrete logarithms.

(True/False)
4.8/5
(28)

the attacker finds an efficient signing algorithm that provides an equivalent way of constructing signatures on arbitrary messages is a ___________ .

(Short Answer)
4.9/5
(40)

In the __________ approach only the sender knows the private key so only the sender could have produced a valid signature.

(Multiple Choice)
4.8/5
(27)

the term __________ refers to a digital signature scheme that involves only the communicating parties.

(Short Answer)
4.8/5
(26)

It must be relatively difficult to recognize and verify the digital signature.

(True/False)
4.8/5
(31)

the _________________, which is the latest of the RSA schemes, is the one that RSA Laboratories recommends as the most secure of the RSA schemes.

(Multiple Choice)
4.7/5
(38)

the first stage in generating an RSA-PSS signature of a message M is to generate from M a fixed-length message digest, called an ______________.

(Short Answer)
4.9/5
(38)

Message authentication protects two parties who exchange messages from any third party, however, it does not protect the two parties against each other.

(True/False)
4.9/5
(32)

the digital signature function does not include the authentication function.

(True/False)
4.9/5
(34)

the message dependent part of the Schnorr digital signature generation requires multiplying a __________ with an n-bit integer.

(Short Answer)
4.9/5
(41)

to create a __________ a user calculates two quantities, r and s, that are functions of the public key components (p, q, g), the user's private key (x), the hash code of the message H(M), and an additional integer k that should be generated randomly or pseudorandomly and be unique for each signing.

(Multiple Choice)
4.8/5
(30)

Similar to the generic attack, except that the list of messages to be signed is chosen after the attacker knows the user's public key but before any signatures are seen, is the __________ attack.

(Multiple Choice)
4.9/5
(34)

As with ElGamal encryption, the global elements of __________ are a prime number q and a, which is a primitive root of q.

(Multiple Choice)
4.8/5
(39)

the main work for signature generation depends on the message and is done during the idle time of the processor.

(True/False)
4.9/5
(33)

the __________ is formed by taking the hash of the message and encrypting the message with the creator's private key.

(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)