Exam 21: Public-Key Cryptography and Message Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The purpose of the algorithm is to enable two users to exchange a __________ securely that can then be used for subsequent encryption of messages.

Free
(Essay)
4.8/5
(39)
Correct Answer:
Verified

secret key

_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

D

SHA-1 is considered to be very secure.

Free
(True/False)
4.8/5
(30)
Correct Answer:
Verified

False

Four possible approaches to attacking the RSA algorithm are: brute force,timing attacks,_________ attacks,and chosen ciphertext attacks.

(Essay)
4.7/5
(38)

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption,but can be adapted to work with any implementation that does not run in fixed time.

(Multiple Choice)
4.7/5
(39)

The appeal of HMAC is that its designers have been able to prove an exact relationship between the strength of the embedded hash function and the strength of HMAC.

(True/False)
4.9/5
(45)

Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES.

(True/False)
4.8/5
(37)

"Must support hash value lengths of 224,256,384,and 512 bits" and "algorithm must process small blocks at a time instead of requiring the entire message to be buffered in memory before processing it" are requirements for ________.

(Essay)
4.8/5
(29)

The operations performed during a round consist of circular shifts,and primitive Boolean functions based on DSS,MD5,SHA,and RSA.

(True/False)
4.8/5
(34)

___________ was the first published public-key algorithm.

(Multiple Choice)
4.9/5
(29)

NIST has published FIPS PUB 186,which is known as the ___________.

(Essay)
4.9/5
(28)

The purpose of the __________ algorithm is to enable two users to exchange a secret key securely that can then be used for subsequent encryption of messages.

(Essay)
4.9/5
(33)

The DSS makes use of the _________ and presents a new digital signature technique,the Digital Signature Algorithm (DSA).

(Multiple Choice)
4.8/5
(34)

SHA-1 produces a hash value of __________ bits.

(Multiple Choice)
4.8/5
(34)

Timing attacks are only applicable to RSA.

(True/False)
4.9/5
(38)

SHA-2 shares the same structure and mathematical operations as its predecessors and this is a cause for concern.

(True/False)
4.7/5
(33)

HMAC can be proven secure provided that the embedded hash function has some reasonable cryptographic strengths.

(True/False)
4.8/5
(40)

RSA is a block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n.

(True/False)
4.8/5
(39)

A __________ type of attack exploits properties of the RSA algorithm.

(Multiple Choice)
4.8/5
(35)

_________ attacks have several approaches,all equivalent in effort to factoring the product of two primes.

(Multiple Choice)
5.0/5
(40)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)