Exam 12: Message Authentication Codes
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
A CTR-based authenticated encryption approach is the most efficient mode of operation for high-speed packet networks.
Free
(True/False)
4.8/5
(37)
Correct Answer:
True
Message authentication is a mechanism or service used to verify the integrity of a message.
Free
(True/False)
4.8/5
(36)
Correct Answer:
True
The MAC does not provide a digital signature because both sender and receiver share the same key.
Free
(True/False)
4.8/5
(37)
Correct Answer:
True
A __________ takes a variable length message and a secret key as input and produces an authentication code.
(Essay)
4.7/5
(27)
The HtE approach is used in the __________ protocol to protect WiFi networks.
(Essay)
4.8/5
(32)
The types of functions that may be used to produce an authenticator are grouped into three classes: hash function,message authentication code,and ___________ .
(Essay)
4.9/5
(35)
The GCM mode makes use of two functions: __________,which is a keyed hash function,and GCTR.
(Multiple Choice)
4.9/5
(39)
The security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function.
(True/False)
4.8/5
(39)
___________ is a term used to describe encryption systems that simultaneously protect confidentiality and authenticity of communications.
(Essay)
4.8/5
(32)
The __________ mode of operation was standardized by NIST specifically to support the security requirements of IEEE 802.1 WiFi wireless local area networks but can be used in any networking application requiring authenticated encryption.
(Essay)
4.8/5
(37)
With _________ authentication an opponent would have difficulty generating ciphertext that when decrypted would have valid error control bits.
(Multiple Choice)
5.0/5
(37)
The key algorithmic ingredients of _________ are the AES encryption algorithm,the CTR mode of operation,and the CMAC authentication algorithm.
(Multiple Choice)
4.7/5
(31)
To attack MD5,the attacker can choose any set of messages and work on these offline on a dedicated computing facility to find a collision.
(True/False)
4.9/5
(38)
Insertion of messages into the network from a fraudulent source is a __________ attack.
(Multiple Choice)
4.7/5
(30)
The order in which the frame check sequence and encryption functions are performed is not critical for authentication.
(True/False)
4.9/5
(29)
A brute-force attack on a MAC is easier than a brute-force attack on a hash function.
(True/False)
4.8/5
(37)
_________ encryption provides authentication among those who share the secret key.
(Multiple Choice)
4.8/5
(36)
One means of forming a MAC is to combine a cryptographic hash function in some fashion with a secret key.
(True/False)
4.9/5
(35)
The __________ algorithm can be defined as using the cipher block chaining mode of operation of DES with an initialization vector of zero.
(Essay)
4.9/5
(33)
One approach to constructing a MAC is to use a symmetric block cipher in such a way that it produces a __________ output for a variable length input.
(Essay)
4.8/5
(37)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)