Exam 21: Public-Key Cryptography and Message Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Timing attacks are only applicable to RSA.

(True/False)
4.8/5
(29)

SHA-1 produces a hash value of __________ bits.

(Multiple Choice)
4.9/5
(34)

The security of any MAC function based on an embedded hash function depends in some way on the _________ strength of the underlying hash function.

(Short Answer)
5.0/5
(33)

The purpose of the algorithm is to enable two users to exchange a __________ securely that can then be used for subsequent encryption of messages.

(Short Answer)
4.8/5
(33)

______ has been issued as RFC 2014,has been chosen as the mandatory-to-implement MAC for IP Security,and is used in other Internet protocols,such as Transport Layer Security.

(Short Answer)
4.7/5
(34)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)