Deck 21: Public-Key Cryptography and Message Authentication

Full screen (f)
exit full mode
Question
The Diffie-Hellman algorithm depends for its effectiveness on the
difficulty of computing discrete logarithms.
Use Space or
up arrow
down arrow
to flip the card.
Question
The appeal of HMAC is that its designers have been able to prove an
exact relationship between the strength of the embedded hash function and the strength of HMAC.
Question
HMAC can be proven secure provided that the embedded hash function
has some reasonable cryptographic strengths.
Question
The key exchange protocol is vulnerable to a man-in-the-middle
attack because it does not authenticate the participants.
Question
Timing attacks are only applicable to RSA.
Question
RSA is a block cipher in which the plaintext and ciphertext are integers
between 0 and n - 1 for some n.
Question
Issued as RFC 2104,__________ has been chosen as the mandatory-to-implement MAC for IP Security.

A)RSA
B)SHA-3
C)DSS
D)HMAC
Question
A hash function such as SHA-1 was not designed for use as a MAC
and cannot be used directly for that purpose because it does not rely on a secret key.
Question
SHA-1 is considered to be very secure.
Question
In 2005,NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHA versions by 2010.

A)SHA-1
B)SHA-512
C)SHA-256
D)SHA-2
Question
SHA is perhaps the most widely used family of hash functions.
Question
The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.

A)SHA-1
B)HMAC
C)MD5
D)RSA
Question
A ________ attack involves trying all possible private keys.

A)mathematical
B)timing
C)brute-force
D)chosen ciphertext
Question
Cryptographic hash functions generally execute faster in software
than conventional encryption algorithms such as DES.
Question
Unlike RSA,DSS cannot be used for encryption or key exchange.
Question
The one-way hash function is important not only in message
authentication but also in digital signatures.
Question
The operations performed during a round consist of circular
shifts,and primitive Boolean functions based on DSS,MD5,SHA,and RSA.
Question
SHA-2 shares the same structure and mathematical operations as its
predecessors and this is a cause for concern.
Question
SHA-3 algorithms must be designed to resist any potentially
successful attack on SHA-2 functions.
Question
SHA-1 produces a hash value of __________ bits.

A)256
B)160
C)384
D)180
Question
The purpose of the __________ algorithm is to enable two users to exchange a secret key securely that can then be used for subsequent encryption of messages.
Question
Although the _________ attack is a serious threat,there are simple countermeasures that can be used such as constant time calcs,random delays or blinding computations.

A)timing
B)chosen ciphertext
C)mathematical
D)none of the above
Question
__________ are alarming for two reasons: they come from a completely unexpected direction and they are a ciphertext-only attack.
Question
The Secure Hash Algorithm (SHA)was developed by the _________ and published as a federal information processing standard (FIPS 180)in 1993.
Question
_________ attacks have several approaches,all equivalent in effort to factoring the product of two primes.

A)Mathematical
B)Brute-force
C)Chosen ciphertext
D)Timing
Question
Four possible approaches to attacking the RSA algorithm are: brute force,timing attacks,_________ attacks,and chosen ciphertext attacks.
Question
The evaluation criteria for the new hash function are: security,_______,and algorithm and implementation characteristics.
Question
______ has been issued as RFC 2014,has been chosen as the mandatory-to-implement MAC for IP Security,and is used in other Internet protocols,such as Transport Layer Security.
Question
The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size,thereby reducing processing overhead.

A)ECC
B)MD5
C)Diffie-Hellman
D)none of the above
Question
One of the simplest hash functions is the ________ of every block.
Question
___________ was the first published public-key algorithm.

A)NIST
B)Diffie-Hellman
C)RC4
D)RSA
Question
A __________ type of attack exploits properties of the RSA algorithm.

A)timing
B)brute-force
C)chosen ciphertext
D)mathematical
Question
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption,but can be adapted to work with any implementation that does not run in fixed time.

A)mathematical
B)timing
C)chosen ciphertext
D)brute-force
Question
NIST has published FIPS PUB 186,which is known as the ___________.
Question
The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.

A)ECC
B)RSA
C)DSS
D)XOR
Question
The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186,known as the __________.

A)XOR
B)MD5
C)MAC
D)DSS
Question
One of the first public-key schemes,_______,was developed in 1977 by Ron Rivest,Adi Shamir,and Len Adleman.
Question
The DSS makes use of the _________ and presents a new digital signature technique,the Digital Signature Algorithm (DSA).

A)HMAC
B)XOR
C)RSA
D)SHA-1
Question
Versions of SHA,with hash value lengths of 256,384,and 512 bits,(SHA-256,SHA-384,and SHA 512)are collectively known as _________.
Question
_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.

A)Digital standards
B)Mathematical attacks
C)Ciphers
D)Timing attacks
Question
The security of any MAC function based on an embedded hash function depends in some way on the _________ strength of the underlying hash function.
Question
The purpose of the algorithm is to enable two users to exchange a __________ securely that can then be used for subsequent encryption of messages.
Question
If speed is a concern,it is fully acceptable to use _________ rather than SHA as the embedded hash function for HMAC.
Question
"Must support hash value lengths of 224,256,384,and 512 bits" and "algorithm must process small blocks at a time instead of requiring the entire message to be buffered in memory before processing it" are requirements for ________.
Question
Perhaps the most widely used public-key algorithms are _________ and Diffie-Hellman.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 21: Public-Key Cryptography and Message Authentication
1
The Diffie-Hellman algorithm depends for its effectiveness on the
difficulty of computing discrete logarithms.
True
2
The appeal of HMAC is that its designers have been able to prove an
exact relationship between the strength of the embedded hash function and the strength of HMAC.
True
3
HMAC can be proven secure provided that the embedded hash function
has some reasonable cryptographic strengths.
True
4
The key exchange protocol is vulnerable to a man-in-the-middle
attack because it does not authenticate the participants.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Timing attacks are only applicable to RSA.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
RSA is a block cipher in which the plaintext and ciphertext are integers
between 0 and n - 1 for some n.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Issued as RFC 2104,__________ has been chosen as the mandatory-to-implement MAC for IP Security.

A)RSA
B)SHA-3
C)DSS
D)HMAC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
A hash function such as SHA-1 was not designed for use as a MAC
and cannot be used directly for that purpose because it does not rely on a secret key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
SHA-1 is considered to be very secure.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
In 2005,NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHA versions by 2010.

A)SHA-1
B)SHA-512
C)SHA-256
D)SHA-2
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
SHA is perhaps the most widely used family of hash functions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.

A)SHA-1
B)HMAC
C)MD5
D)RSA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
A ________ attack involves trying all possible private keys.

A)mathematical
B)timing
C)brute-force
D)chosen ciphertext
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Cryptographic hash functions generally execute faster in software
than conventional encryption algorithms such as DES.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Unlike RSA,DSS cannot be used for encryption or key exchange.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The one-way hash function is important not only in message
authentication but also in digital signatures.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The operations performed during a round consist of circular
shifts,and primitive Boolean functions based on DSS,MD5,SHA,and RSA.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
SHA-2 shares the same structure and mathematical operations as its
predecessors and this is a cause for concern.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
SHA-3 algorithms must be designed to resist any potentially
successful attack on SHA-2 functions.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
SHA-1 produces a hash value of __________ bits.

A)256
B)160
C)384
D)180
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
The purpose of the __________ algorithm is to enable two users to exchange a secret key securely that can then be used for subsequent encryption of messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Although the _________ attack is a serious threat,there are simple countermeasures that can be used such as constant time calcs,random delays or blinding computations.

A)timing
B)chosen ciphertext
C)mathematical
D)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ are alarming for two reasons: they come from a completely unexpected direction and they are a ciphertext-only attack.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
The Secure Hash Algorithm (SHA)was developed by the _________ and published as a federal information processing standard (FIPS 180)in 1993.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
_________ attacks have several approaches,all equivalent in effort to factoring the product of two primes.

A)Mathematical
B)Brute-force
C)Chosen ciphertext
D)Timing
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
Four possible approaches to attacking the RSA algorithm are: brute force,timing attacks,_________ attacks,and chosen ciphertext attacks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
The evaluation criteria for the new hash function are: security,_______,and algorithm and implementation characteristics.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
______ has been issued as RFC 2014,has been chosen as the mandatory-to-implement MAC for IP Security,and is used in other Internet protocols,such as Transport Layer Security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size,thereby reducing processing overhead.

A)ECC
B)MD5
C)Diffie-Hellman
D)none of the above
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
One of the simplest hash functions is the ________ of every block.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
___________ was the first published public-key algorithm.

A)NIST
B)Diffie-Hellman
C)RC4
D)RSA
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
A __________ type of attack exploits properties of the RSA algorithm.

A)timing
B)brute-force
C)chosen ciphertext
D)mathematical
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption,but can be adapted to work with any implementation that does not run in fixed time.

A)mathematical
B)timing
C)chosen ciphertext
D)brute-force
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
NIST has published FIPS PUB 186,which is known as the ___________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.

A)ECC
B)RSA
C)DSS
D)XOR
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186,known as the __________.

A)XOR
B)MD5
C)MAC
D)DSS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
One of the first public-key schemes,_______,was developed in 1977 by Ron Rivest,Adi Shamir,and Len Adleman.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The DSS makes use of the _________ and presents a new digital signature technique,the Digital Signature Algorithm (DSA).

A)HMAC
B)XOR
C)RSA
D)SHA-1
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
Versions of SHA,with hash value lengths of 256,384,and 512 bits,(SHA-256,SHA-384,and SHA 512)are collectively known as _________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.

A)Digital standards
B)Mathematical attacks
C)Ciphers
D)Timing attacks
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
The security of any MAC function based on an embedded hash function depends in some way on the _________ strength of the underlying hash function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
The purpose of the algorithm is to enable two users to exchange a __________ securely that can then be used for subsequent encryption of messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
If speed is a concern,it is fully acceptable to use _________ rather than SHA as the embedded hash function for HMAC.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
"Must support hash value lengths of 224,256,384,and 512 bits" and "algorithm must process small blocks at a time instead of requiring the entire message to be buffered in memory before processing it" are requirements for ________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
Perhaps the most widely used public-key algorithms are _________ and Diffie-Hellman.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.