Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Network Security Essentials
Quiz 3: Public-Key Cryptography and Message Authentication
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.
Question 2
True/False
Because of the mathematical properties of the message authentication code function it is less vulnerable to being broken than encryption.
Question 3
True/False
The private key is known only to its owner.
Question 4
Short Answer
The __________ approach has two advantages: it provides a digital signature as well as message authentication and it does not require the distribution of keys to communicating parties.
Question 5
Short Answer
Protection against active attacks (falsification of data and transactions) is known as ___________ .
Question 6
True/False
The two important aspects of encryption are to verify that the contents of the message have not been altered and that the source is authentic.
Question 7
True/False
In the ECB mode of encryption if an attacker reorders the blocks of ciphertext then each block will still decrypt successfully, however, the reordering may alter the meaning of the overall data sequence.