Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice
Quiz 21: Public-Key Cryptography and Message Authentication
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
The purpose of the __________ algorithm is to enable two users to exchange a secret key securely that can then be used for subsequent encryption of messages.
Question 22
Multiple Choice
Although the _________ attack is a serious threat,there are simple countermeasures that can be used such as constant time calcs,random delays or blinding computations.
Question 23
Short Answer
__________ are alarming for two reasons: they come from a completely unexpected direction and they are a ciphertext-only attack.
Question 24
Essay
The Secure Hash Algorithm (SHA)was developed by the _________ and published as a federal information processing standard (FIPS 180)in 1993.
Question 25
Multiple Choice
_________ attacks have several approaches,all equivalent in effort to factoring the product of two primes.
Question 26
Short Answer
Four possible approaches to attacking the RSA algorithm are: brute force,timing attacks,_________ attacks,and chosen ciphertext attacks.
Question 27
Short Answer
The evaluation criteria for the new hash function are: security,_______,and algorithm and implementation characteristics.
Question 28
Short Answer
______ has been issued as RFC 2014,has been chosen as the mandatory-to-implement MAC for IP Security,and is used in other Internet protocols,such as Transport Layer Security.
Question 29
Multiple Choice
The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size,thereby reducing processing overhead.
Question 30
Short Answer
One of the simplest hash functions is the ________ of every block.
Question 31
Multiple Choice
___________ was the first published public-key algorithm.
Question 32
Multiple Choice
A __________ type of attack exploits properties of the RSA algorithm.
Question 33
Multiple Choice
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption,but can be adapted to work with any implementation that does not run in fixed time.