Exam 12: Message Authentication Codes

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

"Release of message contents to any person or process not possessing the appropriate cryptographic key" is a __________ attack.

(Multiple Choice)
4.9/5
(29)

The appeal of __________ is that its designers have been able to prove an exact relationship between the strength of the embedded hash function and the strength of this form of authentication.

(Multiple Choice)
4.8/5
(33)

If the calculated frame check sequence is equal to the incoming frame check sequence the message is considered authentic.

(True/False)
5.0/5
(40)

When an entire message is encrypted for confidentiality using either symmetric or asymmetric encryption the security of the scheme generally depends on the __________ of the key.

(Essay)
4.8/5
(28)

Message authentication may also verify sequencing and timeliness.

(True/False)
4.7/5
(28)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)