Deck 3: Public-Key Cryptography and Message Authentication

Full screen (f)
exit full mode
Question
The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.
Use Space or
up arrow
down arrow
to flip the card.
Question
Because of the mathematical properties of the message authentication code function it is less vulnerable to being broken than encryption.
Question
The private key is known only to its owner.
Question
The __________ approach has two advantages: it provides a digital signature as well as message authentication and it does not require the distribution of keys to communicating parties.
Question
Protection against active attacks (falsification of data and transactions) is known as ___________ .
Question
The two important aspects of encryption are to verify that the contents of the message have not been altered and that the source is authentic.
Question
In the ECB mode of encryption if an attacker reorders the blocks of ciphertext then each block will still decrypt successfully, however, the reordering may alter the meaning of the overall data sequence.
Question
Public key algorithms are based on mathematical functions rather than on simple operations on bit patterns.
Question
The key exchange protocol is vulnerable to a man-in-the-middle attack because it does not authenticate the participants.
Question
The __________ property guarantees that it is impossible to find an alternative message with the same hash value as a given message, thus preventing forgery when an encrypted hash code is used.
Question
Public key algorithms are useful in the exchange of conventional encryption keys.
Question
The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms.
Question
The main advantage of HMAC over other proposed hash based schemes is that HMAC can be proven secure, provided that the embedded hash function has some reasonable cryptographic strengths.
Question
Private key encryption is used to produce digital signatures which provide an enhanced form of message authentication.
Question
Like the MAC, a __________ accepts a variable size message M as input and produces a fixed size message digest H(M) as output.Unlike the MAC, it does not take a secret key as input.
Question
Message encryption alone provides a secure form of authentication.
Question
The __________ property is the "one-way" property and is important if the authentication technique involves the use of a secret value.
Question
As with symmetric encryption, there are two approaches to attacking a secure hash function: brute-force attack and ___________ .
Question
Cryptographic hash functions generally execute slower in software than conventional encryption algorithms such as DES.
Question
In addition to providing authentication, a message digest also provides data integrity and performs the same function as a frame check sequence.
Question
The key algorithmic ingredients of __________ are the AES encryption algorithm, the CTR mode of operation, and the CMAC authentication algorithm.
Question
__________ is a term used to describe encryption systems that simultaneously protect confidentiality and authenticity (integrity) of communications.
Question
A __________ is when the sender "signs" a message with its private key, which is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message.
Question
The _________ was developed by NIST and published as a federal information processing standard in 1993.
Question
The __________ algorithm accepts the ciphertext and the matching key and produces the original plaintext.
Question
Bob uses his own private key to encrypt the message.When Alice receives the ciphertext she finds that she can decrypt it with Bob's public key, thus proving that the message must have been encrypted by Bob.No one else has Bob's private key and therefore no one else could have created a ciphertext that could be decrypted with Bob's public key.Therefore the entire encrypted message serves as a _________ .
Question
A _________ is when two sides cooperate to exchange a session key.
Question
The two most widely used public key algorithms are RSA and _________ .
Question
Using an algorithm that is designed to provide only the digital signature function, the _________ makes use of the SHA-1 and cannot be used for encryption or key exchange.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/29
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Public-Key Cryptography and Message Authentication
1
The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.
True
2
Because of the mathematical properties of the message authentication code function it is less vulnerable to being broken than encryption.
True
3
The private key is known only to its owner.
True
4
The __________ approach has two advantages: it provides a digital signature as well as message authentication and it does not require the distribution of keys to communicating parties.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
5
Protection against active attacks (falsification of data and transactions) is known as ___________ .
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
6
The two important aspects of encryption are to verify that the contents of the message have not been altered and that the source is authentic.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
7
In the ECB mode of encryption if an attacker reorders the blocks of ciphertext then each block will still decrypt successfully, however, the reordering may alter the meaning of the overall data sequence.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
8
Public key algorithms are based on mathematical functions rather than on simple operations on bit patterns.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
9
The key exchange protocol is vulnerable to a man-in-the-middle attack because it does not authenticate the participants.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
10
The __________ property guarantees that it is impossible to find an alternative message with the same hash value as a given message, thus preventing forgery when an encrypted hash code is used.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
11
Public key algorithms are useful in the exchange of conventional encryption keys.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
12
The security of the Diffie-Hellman key exchange lies in the fact that, while it is relatively easy to calculate exponentials modulo a prime, it is very easy to calculate discrete logarithms.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
13
The main advantage of HMAC over other proposed hash based schemes is that HMAC can be proven secure, provided that the embedded hash function has some reasonable cryptographic strengths.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
14
Private key encryption is used to produce digital signatures which provide an enhanced form of message authentication.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
15
Like the MAC, a __________ accepts a variable size message M as input and produces a fixed size message digest H(M) as output.Unlike the MAC, it does not take a secret key as input.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
16
Message encryption alone provides a secure form of authentication.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
17
The __________ property is the "one-way" property and is important if the authentication technique involves the use of a secret value.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
18
As with symmetric encryption, there are two approaches to attacking a secure hash function: brute-force attack and ___________ .
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
19
Cryptographic hash functions generally execute slower in software than conventional encryption algorithms such as DES.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
20
In addition to providing authentication, a message digest also provides data integrity and performs the same function as a frame check sequence.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
21
The key algorithmic ingredients of __________ are the AES encryption algorithm, the CTR mode of operation, and the CMAC authentication algorithm.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
22
__________ is a term used to describe encryption systems that simultaneously protect confidentiality and authenticity (integrity) of communications.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
23
A __________ is when the sender "signs" a message with its private key, which is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
24
The _________ was developed by NIST and published as a federal information processing standard in 1993.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
25
The __________ algorithm accepts the ciphertext and the matching key and produces the original plaintext.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
26
Bob uses his own private key to encrypt the message.When Alice receives the ciphertext she finds that she can decrypt it with Bob's public key, thus proving that the message must have been encrypted by Bob.No one else has Bob's private key and therefore no one else could have created a ciphertext that could be decrypted with Bob's public key.Therefore the entire encrypted message serves as a _________ .
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
27
A _________ is when two sides cooperate to exchange a session key.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
28
The two most widely used public key algorithms are RSA and _________ .
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
29
Using an algorithm that is designed to provide only the digital signature function, the _________ makes use of the SHA-1 and cannot be used for encryption or key exchange.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 29 flashcards in this deck.