Exam 12: Message Authentication Codes
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
Message encryption by itself cannot provide a measure of authentication.
(True/False)
4.9/5
(39)
An important characteristic of the MAC algorithm is that it needs to be reversible.
(True/False)
4.8/5
(32)
The approach taken by the Transport Layer Security protocol and the Wireless Transport Layer Security Protocol involve invoking HMAC _________ for each block of output wi.
(Multiple Choice)
4.8/5
(28)
Attacks on MACs can be grouped into two categories: brute-force attacks and __________ .
(Essay)
4.8/5
(28)
HMAC is a widely used standardized _________ function and is implemented in many protocols and applications.
(Essay)
4.8/5
(29)
The straightforward use of public-key encryption provides confidentiality and authentication.
(True/False)
4.9/5
(34)
A recipient in possession of the secret key cannot generate an authentication code to verify the integrity of the message.
(True/False)
4.9/5
(35)
Discovery of the pattern of traffic between parties is a __________ attack.
(Essay)
4.8/5
(39)
The __________ mode of operation is designed to be parallelizable so that it can provide high throughput with low cost and low latency.
(Multiple Choice)
4.9/5
(40)
Two MACs that are based on the use of a block cipher mode of operation are Data Authentication Algorithm and __________ .
(Multiple Choice)
4.8/5
(29)
The essential elements of any pseudorandom number generator are a __________ and a deterministic algorithm for generating a stream of pseudorandom bits.
(Multiple Choice)
4.8/5
(31)
A __________ is an algorithm that requires the use of a secret key.
(Multiple Choice)
4.8/5
(28)
Any modification to a sequence of messages between parties,including insertion,deletion,and reordering is a __________ attack.
(Essay)
4.9/5
(34)
__________ assures that data received are exactly as sent and that the purposed identity of the sender is valid.
(Essay)
4.8/5
(39)
As with encryption algorithms and hash functions cryptanalytic attacks on MAC algorithms seek to exploit some property of the algorithm to perform some attack other than an exhaustive search.
(True/False)
4.8/5
(41)
Confidentiality can be provided by performing message encryption __________ the MAC algorithm.
(Multiple Choice)
4.8/5
(25)
An alternative authentication technique involves the use of a secret key to generate a small fixed size block of data known as a __________ or MAC that is appended to the message.
(Essay)
4.8/5
(32)
The _________ attack is when the attacker is looking for two messages M and M1 that produce the same hash: HM)= HM1)
(Multiple Choice)
4.7/5
(30)
NIST SP 800-90,IEEE 802.11i,and TLS/WTLS are three ____________ based on HMAC.
(Essay)
4.8/5
(33)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)