Exam 12: Message Authentication Codes

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Message encryption by itself cannot provide a measure of authentication.

(True/False)
4.9/5
(39)

An important characteristic of the MAC algorithm is that it needs to be reversible.

(True/False)
4.8/5
(32)

The approach taken by the Transport Layer Security protocol and the Wireless Transport Layer Security Protocol involve invoking HMAC _________ for each block of output wi.

(Multiple Choice)
4.8/5
(28)

Attacks on MACs can be grouped into two categories: brute-force attacks and __________ .

(Essay)
4.8/5
(28)

HMAC is a widely used standardized _________ function and is implemented in many protocols and applications.

(Essay)
4.8/5
(29)

The straightforward use of public-key encryption provides confidentiality and authentication.

(True/False)
4.9/5
(34)

A recipient in possession of the secret key cannot generate an authentication code to verify the integrity of the message.

(True/False)
4.9/5
(35)

Discovery of the pattern of traffic between parties is a __________ attack.

(Essay)
4.8/5
(39)

The __________ mode of operation is designed to be parallelizable so that it can provide high throughput with low cost and low latency.

(Multiple Choice)
4.9/5
(40)

The MAC function is a __________ function.

(Multiple Choice)
4.9/5
(30)

Two MACs that are based on the use of a block cipher mode of operation are Data Authentication Algorithm and __________ .

(Multiple Choice)
4.8/5
(29)

The essential elements of any pseudorandom number generator are a __________ and a deterministic algorithm for generating a stream of pseudorandom bits.

(Multiple Choice)
4.8/5
(31)

A __________ is an algorithm that requires the use of a secret key.

(Multiple Choice)
4.8/5
(28)

Any modification to a sequence of messages between parties,including insertion,deletion,and reordering is a __________ attack.

(Essay)
4.9/5
(34)

__________ assures that data received are exactly as sent and that the purposed identity of the sender is valid.

(Essay)
4.8/5
(39)

As with encryption algorithms and hash functions cryptanalytic attacks on MAC algorithms seek to exploit some property of the algorithm to perform some attack other than an exhaustive search.

(True/False)
4.8/5
(41)

Confidentiality can be provided by performing message encryption __________ the MAC algorithm.

(Multiple Choice)
4.8/5
(25)

An alternative authentication technique involves the use of a secret key to generate a small fixed size block of data known as a __________ or MAC that is appended to the message.

(Essay)
4.8/5
(32)

The _________ attack is when the attacker is looking for two messages M and M1 that produce the same hash: HM)= HM1)

(Multiple Choice)
4.7/5
(30)

NIST SP 800-90,IEEE 802.11i,and TLS/WTLS are three ____________ based on HMAC.

(Essay)
4.8/5
(33)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)