Exam 21: Public-Key Cryptography and Message Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

_________ attacks have several approaches, all equivalent in effort to factoring the product of two primes.

(Multiple Choice)
5.0/5
(35)

The appeal of HMAC is that its designers have been able to prove anexact relationship between the strength of the embedded hash function and the strength of HMAC.

(True/False)
4.8/5
(34)

"Must support hash value lengths of 224, 256,384, and 512 bits" and "algorithm must process small blocks at a time instead of requiring the entire message to be buffered in memory before processing it" are requirements for ________.

(Short Answer)
4.9/5
(25)

HMAC can be proven secure provided that the embedded hash functionhas some reasonable cryptographic strengths.

(True/False)
4.7/5
(34)

Although the _________ attack is a serious threat, there are simple countermeasures that can be used such as constant time calcs, random delays or blinding computations.

(Multiple Choice)
4.8/5
(31)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)