Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Computer Security Principles and Practice Study Set 1
Quiz 21: Public-Key Cryptography and Message Authentication
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Essay
The purpose of the __________ algorithm is to enable two users to exchange a secret key securely that can then be used for subsequent encryption of messages.
Question 22
Multiple Choice
The DSS makes use of the _________ and presents a new digital signature technique,the Digital Signature Algorithm (DSA) .
Question 23
Multiple Choice
_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.
Question 24
Essay
One of the first public-key schemes,_______,was developed in 1977 by Ron Rivest,Adi Shamir,and Len Adleman.
Question 25
Multiple Choice
The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size,thereby reducing processing overhead.
Question 26
Essay
The evaluation criteria for the new hash function are: security,_______,and algorithm and implementation characteristics.
Question 27
Essay
One of the simplest hash functions is the ________ of every block.
Question 28
Essay
The Secure Hash Algorithm (SHA)was developed by the _________ and published as a federal information processing standard (FIPS 180)in 1993.
Question 29
Multiple Choice
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption,but can be adapted to work with any implementation that does not run in fixed time.