Exam 12: Message Authentication Codes

arrow

8,400 students have unlocked this exam

  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A CtR-based authenticated encryption approach is the most efficient mode of operation for high-speed packet networks.

(True/False)
4.8/5
(40)

A brute-force attack on a MAC is easier than a brute-force attack on a hash function.

(True/False)
4.9/5
(46)

One approach to constructing a MAC is to use a symmetric block cipher in such a way that it produces a __________ output for a variable length input.

(Short Answer)
4.8/5
(33)

As with encryption algorithms and hash functions cryptanalytic attacks on MAC algorithms seek to exploit some property of the algorithm to perform some attack other than an exhaustive search.

(True/False)
4.9/5
(41)

__________ assures that data received are exactly as sent and that the purposed identity of the sender is valid.

(Short Answer)
4.9/5
(37)

_________ encryption provides authentication among those who share the secret key.

(Multiple Choice)
4.9/5
(31)

Confidentiality can be provided by performing message encryption __________ the MAC algorithm.

(Multiple Choice)
4.8/5
(36)

Any modification to a sequence of messages between parties, including insertion, deletion, and reordering is a __________ attack.

(Short Answer)
4.9/5
(30)

to attack MD5, the attacker can choose any set of messages and work on these offline on a dedicated computing facility to find a collision.

(True/False)
4.9/5
(33)

"Release of message contents to any person or process not possessing the appropriate cryptographic key" is a __________ attack.

(Multiple Choice)
4.8/5
(38)

A recipient in possession of the secret key cannot generate an authentication code to verify the integrity of the message.

(True/False)
4.9/5
(39)

Message authentication is a mechanism or service used to verify the integrity of a message.

(True/False)
4.9/5
(34)

the __________ mode of operation was standardized by NISt specifically to support the security requirements of IEEE 802.1 WiFi wireless local area networks but can be used in any networking application requiring authenticated encryption.

(Essay)
4.9/5
(32)

Message authentication may also verify sequencing and timeliness.

(True/False)
4.8/5
(40)

the straightforward use of public-key encryption provides confidentiality and authentication.

(True/False)
4.7/5
(27)

When an entire message is encrypted for confidentiality using either symmetric or asymmetric encryption the security of the scheme generally depends on the __________ of the key.

(Short Answer)
4.8/5
(37)

the security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function.

(True/False)
4.8/5
(38)

Message encryption by itself cannot provide a measure of authentication.

(True/False)
4.9/5
(28)

Insertion of messages into the network from a fraudulent source is a __________ attack.

(Multiple Choice)
4.9/5
(37)

NISt SP 800-90, IEEE 802.11i, and tLS/WtLS are three ____________ based on HMAC.

(Short Answer)
4.8/5
(32)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(1)
  • Multiple Choice(15)
  • Short Answer(14)
  • True False(15)
  • Matching(0)