Filters
Question type

Study Flashcards

The one-way hash function is important not only in message authentication but also in digital signatures.

A) True
B) False

Correct Answer

verifed

verified

Issued as RFC 2104,__________ has been chosen as the mandatory-to-implement MAC for IP Security.


A) RSA
B) SHA-3
C) DSS
D) HMAC

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

The evaluation criteria for the new hash function are: security,_______,and algorithm and implementation characteristics.

Correct Answer

verifed

verified

Perhaps the most widely used public-key algorithms are _________ and Diffie-Hellman.

Correct Answer

verifed

verified

One of the simplest hash functions is the ________ of every block.

Correct Answer

verifed

verified

XOR (bit-b...

View Answer

Four possible approaches to attacking the RSA algorithm are: brute force,timing attacks,_________ attacks,and chosen ciphertext attacks.

Correct Answer

verifed

verified

SHA-3 algorithms must be designed to resist any potentially successful attack on SHA-2 functions.

A) True
B) False

Correct Answer

verifed

verified

Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES.

A) True
B) False

Correct Answer

verifed

verified

__________ are alarming for two reasons: they come from a completely unexpected direction and they are a ciphertext-only attack.

Correct Answer

verifed

verified

The DSS makes use of the _________ and presents a new digital signature technique,the Digital Signature Algorithm (DSA) .


A) HMAC
B) XOR
C) RSA
D) SHA-1

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

RSA is a block cipher in which the plaintext and ciphertext are integers between 0 and n - 1 for some n.

A) True
B) False

Correct Answer

verifed

verified

The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size,thereby reducing processing overhead.


A) ECC
B) MD5
C) Diffie-Hellman
D) none of the above

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The operations performed during a round consist of circular shifts,and primitive Boolean functions based on DSS,MD5,SHA,and RSA.

A) True
B) False

Correct Answer

verifed

verified

A ________ attack involves trying all possible private keys.


A) mathematical
B) timing
C) brute-force
D) chosen ciphertext

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

SHA is perhaps the most widely used family of hash functions.

A) True
B) False

Correct Answer

verifed

verified

The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.


A) SHA-1
B) HMAC
C) MD5
D) RSA

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Versions of SHA,with hash value lengths of 256,384,and 512 bits,(SHA-256,SHA-384,and SHA 512)are collectively known as _________.

Correct Answer

verifed

verified

Although the _________ attack is a serious threat,there are simple countermeasures that can be used such as constant time calcs,random delays or blinding computations.


A) timing
B) chosen ciphertext
C) mathematical
D) none of the above

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

NIST has published FIPS PUB 186,which is known as the ___________.

Correct Answer

verifed

verified

Digital Si...

View Answer

Unlike RSA,DSS cannot be used for encryption or key exchange.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer