Exam 13: Digital Signatures
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
the DSS approach makes use of a hash function.
Free
(True/False)
4.7/5
(40)
Correct Answer:
True
the global public key components of DSA are the same as for the
Schnorr signature scheme.
Free
(True/False)
4.8/5
(30)
Correct Answer:
True
the __________ scheme minimizes the message dependent amount of computation required to generate a signature.
Free
(Short Answer)
4.9/5
(30)
Correct Answer:
Schnorr
the __________ scheme minimizes the message dependent amount of computation required to generate a signature.
(Multiple Choice)
4.7/5
(33)
Administrative controls relating to the security of private keys can be employed by including a ____________ (which includes date and time) and to require prompt reporting of compromised keys to a central authority.
(Short Answer)
4.9/5
(28)
the attacker finds an efficient signing algorithm that provides an equivalent way of constructing signatures on arbitrary messages is a ___________ .
(Short Answer)
4.9/5
(40)
In the __________ approach only the sender knows the private key so only the sender could have produced a valid signature.
(Multiple Choice)
4.8/5
(27)
the term __________ refers to a digital signature scheme that involves only the communicating parties.
(Short Answer)
4.8/5
(26)
It must be relatively difficult to recognize and verify the digital
signature.
(True/False)
4.8/5
(31)
the _________________, which is the latest of the RSA schemes, is the one that RSA Laboratories recommends as the most secure of the RSA schemes.
(Multiple Choice)
4.7/5
(38)
the first stage in generating an RSA-PSS signature of a message
M is to generate from M a fixed-length message digest, called an ______________.
(Short Answer)
4.9/5
(38)
Message authentication protects two parties who exchange
messages from any third party, however, it does not protect the
two parties against each other.
(True/False)
4.9/5
(32)
the digital signature function does not include the authentication
function.
(True/False)
4.9/5
(34)
the message dependent part of the Schnorr digital signature generation requires multiplying a __________ with an n-bit integer.
(Short Answer)
4.9/5
(41)
to create a __________ a user calculates two quantities, r and s, that are functions of the public key components (p, q, g), the user's private key (x), the hash code of the message H(M), and an additional integer k that should be generated randomly or pseudorandomly and be unique for each signing.
(Multiple Choice)
4.8/5
(30)
Similar to the generic attack, except that the list of messages to be signed is chosen after the attacker knows the user's public key but before any signatures are seen, is the __________ attack.
(Multiple Choice)
4.9/5
(34)
As with ElGamal encryption, the global elements of __________ are a prime number q and a, which is a primitive root of q.
(Multiple Choice)
4.8/5
(39)
the main work for signature generation depends on the message
and is done during the idle time of the processor.
(True/False)
4.9/5
(33)
the __________ is formed by taking the hash of the message and encrypting the message with the creator's private key.
(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)