Exam 12: Message Authentication Codes

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

One means of forming a MAC is to combine a cryptographic hash function in some fashion with a secret key.

Free
(True/False)
4.7/5
(35)
Correct Answer:
Verified

True

the types of functions that may be used to produce an authenticator are grouped into three classes: hash function, message authentication code, and ___________ .

Free
(Short Answer)
4.8/5
(46)
Correct Answer:
Verified

message encryption

A __________ takes a variable length message and a secret key as input and produces an authentication code.

Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Verified

message authentication code (MAC)

___________ is a term used to describe encryption systems that simultaneously protect confidentiality and authenticity of communications.

(Short Answer)
4.9/5
(31)

the _________ attack is when the attacker is looking for two messages M and M1 that produce the same hash: H(M) = H(M1)

(Multiple Choice)
4.7/5
(31)

the essential elements of any pseudorandom number generator are a __________ and a deterministic algorithm for generating a stream of pseudorandom bits.

(Multiple Choice)
4.9/5
(36)

With _________ authentication an opponent would have difficulty generating ciphertext that when decrypted would have valid error control bits.

(Multiple Choice)
4.9/5
(37)

A __________ is an algorithm that requires the use of a secret key.

(Multiple Choice)
4.8/5
(31)

Attacks on MACs can be grouped into two categories: brute-force attacks and __________ .

(Short Answer)
4.9/5
(28)

An alternative authentication technique involves the use of a secret key to generate a small fixed size block of data known as a __________ or MAC that is appended to the message.

(Short Answer)
4.8/5
(33)

HMAC is a widely used standardized _________ function and is implemented in many protocols and applications.

(Short Answer)
5.0/5
(41)

the __________ algorithm can be defined as using the cipher block chaining mode of operation of DES with an initialization vector of zero.

(Short Answer)
4.9/5
(36)

the MAC does not provide a digital signature because both sender and receiver share the same key.

(True/False)
4.8/5
(32)

the MAC function is a __________ function.

(Multiple Choice)
4.8/5
(38)

the appeal of __________ is that its designers have been able to prove an exact relationship between the strength of the embedded hash function and the strength of this form of authentication.

(Multiple Choice)
4.7/5
(31)

the GCM mode makes use of two functions: __________, which is a keyed hash function, and GCtR.

(Multiple Choice)
4.9/5
(28)

the key algorithmic ingredients of _________ are the AES encryption algorithm, the CtR mode of operation, and the CMAC authentication algorithm.

(Multiple Choice)
4.7/5
(30)

the approach taken by the transport Layer Security protocol and the Wireless transport Layer Security Protocol involve invoking HMAC _________ for each block of output wi.

(Multiple Choice)
4.8/5
(24)

the order in which the frame check sequence and encryption functions are performed is not critical for authentication.

(True/False)
4.9/5
(41)

An important characteristic of the MAC algorithm is that it needs to be reversible.

(True/False)
4.7/5
(34)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)