Exam 12: Message Authentication Codes

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A CTR-based authenticated encryption approach is the most efficient mode of operation for high-speed packet networks.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

Message authentication is a mechanism or service used to verify the integrity of a message.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

The MAC does not provide a digital signature because both sender and receiver share the same key.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

A __________ takes a variable length message and a secret key as input and produces an authentication code.

(Essay)
4.7/5
(27)

The HtE approach is used in the __________ protocol to protect WiFi networks.

(Essay)
4.8/5
(32)

The types of functions that may be used to produce an authenticator are grouped into three classes: hash function,message authentication code,and ___________ .

(Essay)
4.9/5
(35)

The GCM mode makes use of two functions: __________,which is a keyed hash function,and GCTR.

(Multiple Choice)
4.9/5
(39)

The security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function.

(True/False)
4.8/5
(39)

___________ is a term used to describe encryption systems that simultaneously protect confidentiality and authenticity of communications.

(Essay)
4.8/5
(32)

The __________ mode of operation was standardized by NIST specifically to support the security requirements of IEEE 802.1 WiFi wireless local area networks but can be used in any networking application requiring authenticated encryption.

(Essay)
4.8/5
(37)

With _________ authentication an opponent would have difficulty generating ciphertext that when decrypted would have valid error control bits.

(Multiple Choice)
5.0/5
(37)

The key algorithmic ingredients of _________ are the AES encryption algorithm,the CTR mode of operation,and the CMAC authentication algorithm.

(Multiple Choice)
4.7/5
(31)

To attack MD5,the attacker can choose any set of messages and work on these offline on a dedicated computing facility to find a collision.

(True/False)
4.9/5
(38)

Insertion of messages into the network from a fraudulent source is a __________ attack.

(Multiple Choice)
4.7/5
(30)

The order in which the frame check sequence and encryption functions are performed is not critical for authentication.

(True/False)
4.9/5
(29)

A brute-force attack on a MAC is easier than a brute-force attack on a hash function.

(True/False)
4.8/5
(37)

_________ encryption provides authentication among those who share the secret key.

(Multiple Choice)
4.8/5
(36)

One means of forming a MAC is to combine a cryptographic hash function in some fashion with a secret key.

(True/False)
4.9/5
(35)

The __________ algorithm can be defined as using the cipher block chaining mode of operation of DES with an initialization vector of zero.

(Essay)
4.9/5
(33)

One approach to constructing a MAC is to use a symmetric block cipher in such a way that it produces a __________ output for a variable length input.

(Essay)
4.8/5
(37)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)