Exam 13: Digital Signatures
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
The ____________ components of DSA are the same as in the Schnorr signature scheme.
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
C
A _________ is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
Free
(Essay)
4.9/5
(39)
Correct Answer:
digital signature
The term __________ refers to a digital signature scheme that involves only the communicating parties.
Free
(Essay)
4.7/5
(33)
Correct Answer:
direct digital signature
Message authentication protects two parties who exchange messages from any third party,however,it does not protect the two parties against each other.
(True/False)
4.8/5
(32)
The __________ is formed by taking the hash of the message and encrypting the message with the creator's private key.
(Multiple Choice)
4.9/5
(32)
It is important in a direct digital signature to perform an outer confidentiality function first and then the signature function.
(True/False)
4.9/5
(22)
The __________ scheme minimizes the message dependent amount of computation required to generate a signature.
(Multiple Choice)
4.7/5
(31)
It must be relatively difficult to recognize and verify the digital signature.
(True/False)
4.8/5
(40)
In the __________ approach only the sender knows the private key so only the sender could have produced a valid signature.
(Multiple Choice)
4.9/5
(37)
A digital signature must have the following properties: it must verify the author and the date and time of the signature;it must authenticate the contents at the time of the signature;and it must ___________ to resolve disputes.
(Essay)
4.8/5
(31)
__________ is where the attacker forges a signature for a particular message chosen by the attacker.
(Multiple Choice)
4.8/5
(43)
The main work for signature generation depends on the message and is done during the idle time of the processor.
(True/False)
4.7/5
(42)
The first stage in generating an RSA-PSS signature of a message M is to generate from M a fixed-length message digest,called an ______________.
(Essay)
4.8/5
(42)
The _________________,which is the latest of the RSA schemes,is the one that RSA Laboratories recommends as the most secure of the RSA schemes.
(Multiple Choice)
4.8/5
(30)
The digital signature function does not include the authentication function.
(True/False)
4.9/5
(45)
The most important development from the work on public-key cryptography is the digital signature.
(True/False)
4.9/5
(39)
A digital signature can guarantee the integrity but not the source of the message.
(True/False)
4.7/5
(32)
As with ElGamal encryption,the global elements of __________ are a prime number q and a,which is a primitive root of q.
(Multiple Choice)
4.9/5
(26)
The first part of the Schnorr digital signature scheme is the generation of a private/public key pair.
(True/False)
4.8/5
(34)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)