Exam 21: Public-Key Cryptography and Message Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The purpose of the algorithm is to enable two users to exchange a __________ securely that can then be used for subsequent encryption of messages.

Free
(Short Answer)
4.8/5
(33)
Correct Answer:
Verified

secret key

The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

D

______ has been issued as RFC 2014, has been chosen as the mandatory-to-implement MAC for IP Security, and is used in other Internet protocols, such as Transport Layer Security.

Free
(Short Answer)
5.0/5
(33)
Correct Answer:
Verified

HMAC

Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) are collectively known as _________.

(Short Answer)
4.8/5
(36)

SHA-1 produces a hash value of __________ bits.

(Multiple Choice)
4.8/5
(43)

Issued as RFC 2104, __________ has been chosen as the mandatory-to-implement MAC for IP Security.

(Multiple Choice)
4.8/5
(31)

Four possible approaches to attacking the RSA algorithm are: brute force, timing attacks, _________ attacks, and chosen ciphertext attacks.

(Short Answer)
4.9/5
(28)

The security of any MAC function based on an embedded hash function depends in some way on the _________ strength of the underlying hash function.

(Short Answer)
4.9/5
(32)

In 2005, NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHA versions by 2010.

(Multiple Choice)
4.8/5
(28)

The evaluation criteria for the new hash function are: security, _______, and algorithm and implementation characteristics.

(Short Answer)
4.7/5
(35)

__________ are alarming for two reasons: they come from a completely unexpected direction and they are a ciphertext-only attack.

(Short Answer)
4.9/5
(33)

One of the simplest hash functions is the ________ of every block.

(Short Answer)
4.9/5
(34)

Cryptographic hash functions generally execute faster in softwarethan conventional encryption algorithms such as DES.

(True/False)
4.7/5
(30)

SHA-2 shares the same structure and mathematical operations as itspredecessors and this is a cause for concern.

(True/False)
4.9/5
(33)

SHA is perhaps the most widely used family of hash functions.

(True/False)
4.9/5
(31)

The key exchange protocol is vulnerable to a man-in-the-middleattack because it does not authenticate the participants.

(True/False)
4.8/5
(30)

The operations performed during a round consist of circularshifts, and primitive Boolean functions based on DSS, MD5, SHA, and RSA.

(True/False)
4.8/5
(35)

Unlike RSA, DSS cannot be used for encryption or key exchange.

(True/False)
4.8/5
(30)

SHA-3 algorithms must be designed to resist any potentiallysuccessful attack on SHA-2 functions.

(True/False)
4.8/5
(24)

The Secure Hash Algorithm (SHA) was developed by the _________ and published as a federal information processing standard (FIPS 180) in 1993.

(Essay)
4.9/5
(34)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)