Exam 12: Message Authentication Codes
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
One means of forming a MAC is to combine a cryptographic hash
function in some fashion with a secret key.
Free
(True/False)
4.7/5
(35)
Correct Answer:
True
the types of functions that may be used to produce an authenticator are grouped into three classes: hash function, message authentication code, and ___________ .
Free
(Short Answer)
4.8/5
(46)
Correct Answer:
message encryption
A __________ takes a variable length message and a secret key as input and produces an authentication code.
Free
(Short Answer)
4.9/5
(33)
Correct Answer:
message authentication code (MAC)
___________ is a term used to describe encryption systems that simultaneously protect confidentiality and authenticity of communications.
(Short Answer)
4.9/5
(31)
the _________ attack is when the attacker is looking for two messages M and M1 that produce the same hash: H(M) = H(M1)
(Multiple Choice)
4.7/5
(31)
the essential elements of any pseudorandom number generator are a __________ and a deterministic algorithm for generating a stream of pseudorandom bits.
(Multiple Choice)
4.9/5
(36)
With _________ authentication an opponent would have difficulty generating ciphertext that when decrypted would have valid error control bits.
(Multiple Choice)
4.9/5
(37)
A __________ is an algorithm that requires the use of a secret key.
(Multiple Choice)
4.8/5
(31)
Attacks on MACs can be grouped into two categories: brute-force attacks and __________ .
(Short Answer)
4.9/5
(28)
An alternative authentication technique involves the use of a secret key to generate a small fixed size block of data known as a __________ or MAC that is appended to the message.
(Short Answer)
4.8/5
(33)
HMAC is a widely used standardized _________ function and is implemented in many protocols and applications.
(Short Answer)
5.0/5
(41)
the __________ algorithm can be defined as using the cipher block chaining mode of operation of DES with an initialization vector of zero.
(Short Answer)
4.9/5
(36)
the MAC does not provide a digital signature because both sender
and receiver share the same key.
(True/False)
4.8/5
(32)
the appeal of __________ is that its designers have been able to prove an exact relationship between the strength of the embedded hash function and the strength of this form of authentication.
(Multiple Choice)
4.7/5
(31)
the GCM mode makes use of two functions: __________, which is a keyed hash function, and GCtR.
(Multiple Choice)
4.9/5
(28)
the key algorithmic ingredients of _________ are the AES encryption algorithm, the CtR mode of operation, and the CMAC authentication algorithm.
(Multiple Choice)
4.7/5
(30)
the approach taken by the transport Layer Security protocol and the Wireless transport Layer Security Protocol involve invoking HMAC _________ for each block of output wi.
(Multiple Choice)
4.8/5
(24)
the order in which the frame check sequence and encryption
functions are performed is not critical for authentication.
(True/False)
4.9/5
(41)
An important characteristic of the MAC algorithm is that it needs
to be reversible.
(True/False)
4.7/5
(34)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)