Deck 21: Public-Key Cryptography and Message Authentication

ملء الشاشة (f)
exit full mode
سؤال
Unlike RSA, DSS cannot be used for encryption or key exchange.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Issued as RFC 2104, __________ has been chosen as the mandatory-to-implement MAC for IP Security.

A) RSA
B) SHA-3
C) DSS
D) HMAC
سؤال
HMAC can be proven secure provided that the embedded hash functionhas some reasonable cryptographic strengths.
سؤال
SHA-3 algorithms must be designed to resist any potentiallysuccessful attack on SHA-2 functions.
سؤال
The Diffie-Hellman algorithm depends for its effectiveness on thedifficulty of computing discrete logarithms.
سؤال
In 2005, NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHA versions by 2010.

A) SHA-1
B) SHA-512
C) SHA-256
D) SHA-2
سؤال
A hash function such as SHA-1 was not designed for use as a MACand cannot be used directly for that purpose because it does not rely on a secret key.
سؤال
Cryptographic hash functions generally execute faster in softwarethan conventional encryption algorithms such as DES.
سؤال
The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.

A) SHA-1
B) HMAC
C) MD5
D) RSA
سؤال
The operations performed during a round consist of circularshifts, and primitive Boolean functions based on DSS, MD5, SHA, and RSA.
سؤال
SHA-1 produces a hash value of __________ bits.

A) 256
B) 160
C) 384
D) 180
سؤال
The one-way hash function is important not only in messageauthentication but also in digital signatures.
سؤال
The key exchange protocol is vulnerable to a man-in-the-middleattack because it does not authenticate the participants.
سؤال
A ________ attack involves trying all possible private keys.

A) mathematical
B) timing
C) brute-force
D) chosen ciphertext
سؤال
Timing attacks are only applicable to RSA.
سؤال
SHA-2 shares the same structure and mathematical operations as itspredecessors and this is a cause for concern.
سؤال
SHA-1 is considered to be very secure.
سؤال
RSA is a block cipher in which the plaintext and ciphertext are integersbetween 0 and n - 1 for some n.
سؤال
SHA is perhaps the most widely used family of hash functions.
سؤال
The appeal of HMAC is that its designers have been able to prove anexact relationship between the strength of the embedded hash function and the strength of HMAC.
سؤال
The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead.

A) ECC
B) MD5
C) Diffie-Hellman
D) none of the above
سؤال
_________ attacks have several approaches, all equivalent in effort to factoring the product of two primes.

A) Mathematical
B) Brute-force
C) Chosen ciphertext
D) Timing
سؤال
NIST has published FIPS PUB 186, which is known as the ___________.
سؤال
The purpose of the __________ algorithm is to enable two users to exchange a secret key securely that can then be used for subsequent encryption of messages.
سؤال
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.

A) mathematical
B) timing
C) chosen ciphertext
D) brute-force
سؤال
The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.

A) ECC
B) RSA
C) DSS
D) XOR
سؤال
The DSS makes use of the _________ and presents a new digital signature technique, the Digital Signature Algorithm (DSA).

A) HMAC
B) XOR
C) RSA
D) SHA-1
سؤال
___________ was the first published public-key algorithm.

A) NIST
B) Diffie-Hellman
C) RC4
D) RSA
سؤال
Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) are collectively known as _________.
سؤال
__________ are alarming for two reasons: they come from a completely unexpected direction and they are a ciphertext-only attack.
سؤال
Four possible approaches to attacking the RSA algorithm are: brute force, timing attacks, _________ attacks, and chosen ciphertext attacks.
سؤال
The Secure Hash Algorithm (SHA) was developed by the _________ and published as a federal information processing standard (FIPS 180) in 1993.
سؤال
The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186, known as the __________.

A) XOR
B) MD5
C) MAC
D) DSS
سؤال
______ has been issued as RFC 2014, has been chosen as the mandatory-to-implement MAC for IP Security, and is used in other Internet protocols, such as Transport Layer Security.
سؤال
One of the first public-key schemes, _______, was developed in 1977 by Ron Rivest, Adi Shamir, and Len Adleman.
سؤال
Although the _________ attack is a serious threat, there are simple countermeasures that can be used such as constant time calcs, random delays or blinding computations.

A) timing
B) chosen ciphertext
C) mathematical
D) none of the above
سؤال
A __________ type of attack exploits properties of the RSA algorithm.

A) timing
B) brute-force
C) chosen ciphertext
D) mathematical
سؤال
One of the simplest hash functions is the ________ of every block.
سؤال
The evaluation criteria for the new hash function are: security, _______, and algorithm and implementation characteristics.
سؤال
_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.

A) Digital standards
B) Mathematical attacks
C) Ciphers
D) Timing attacks
سؤال
"Must support hash value lengths of 224, 256,384, and 512 bits" and "algorithm must process small blocks at a time instead of requiring the entire message to be buffered in memory before processing it" are requirements for ________.
سؤال
The security of any MAC function based on an embedded hash function depends in some way on the _________ strength of the underlying hash function.
سؤال
Perhaps the most widely used public-key algorithms are _________ and Diffie-Hellman.
سؤال
If speed is a concern, it is fully acceptable to use _________ rather than SHA as the embedded hash function for HMAC.
سؤال
The purpose of the algorithm is to enable two users to exchange a __________ securely that can then be used for subsequent encryption of messages.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 21: Public-Key Cryptography and Message Authentication
1
Unlike RSA, DSS cannot be used for encryption or key exchange.
True
2
Issued as RFC 2104, __________ has been chosen as the mandatory-to-implement MAC for IP Security.

A) RSA
B) SHA-3
C) DSS
D) HMAC
D
3
HMAC can be proven secure provided that the embedded hash functionhas some reasonable cryptographic strengths.
True
4
SHA-3 algorithms must be designed to resist any potentiallysuccessful attack on SHA-2 functions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
The Diffie-Hellman algorithm depends for its effectiveness on thedifficulty of computing discrete logarithms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
In 2005, NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHA versions by 2010.

A) SHA-1
B) SHA-512
C) SHA-256
D) SHA-2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
A hash function such as SHA-1 was not designed for use as a MACand cannot be used directly for that purpose because it does not rely on a secret key.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
Cryptographic hash functions generally execute faster in softwarethan conventional encryption algorithms such as DES.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.

A) SHA-1
B) HMAC
C) MD5
D) RSA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
The operations performed during a round consist of circularshifts, and primitive Boolean functions based on DSS, MD5, SHA, and RSA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
SHA-1 produces a hash value of __________ bits.

A) 256
B) 160
C) 384
D) 180
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
The one-way hash function is important not only in messageauthentication but also in digital signatures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
The key exchange protocol is vulnerable to a man-in-the-middleattack because it does not authenticate the participants.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
A ________ attack involves trying all possible private keys.

A) mathematical
B) timing
C) brute-force
D) chosen ciphertext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
Timing attacks are only applicable to RSA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
SHA-2 shares the same structure and mathematical operations as itspredecessors and this is a cause for concern.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
SHA-1 is considered to be very secure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
RSA is a block cipher in which the plaintext and ciphertext are integersbetween 0 and n - 1 for some n.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
SHA is perhaps the most widely used family of hash functions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
The appeal of HMAC is that its designers have been able to prove anexact relationship between the strength of the embedded hash function and the strength of HMAC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead.

A) ECC
B) MD5
C) Diffie-Hellman
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
_________ attacks have several approaches, all equivalent in effort to factoring the product of two primes.

A) Mathematical
B) Brute-force
C) Chosen ciphertext
D) Timing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
NIST has published FIPS PUB 186, which is known as the ___________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
The purpose of the __________ algorithm is to enable two users to exchange a secret key securely that can then be used for subsequent encryption of messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.

A) mathematical
B) timing
C) chosen ciphertext
D) brute-force
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.

A) ECC
B) RSA
C) DSS
D) XOR
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
The DSS makes use of the _________ and presents a new digital signature technique, the Digital Signature Algorithm (DSA).

A) HMAC
B) XOR
C) RSA
D) SHA-1
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
___________ was the first published public-key algorithm.

A) NIST
B) Diffie-Hellman
C) RC4
D) RSA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) are collectively known as _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
__________ are alarming for two reasons: they come from a completely unexpected direction and they are a ciphertext-only attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
Four possible approaches to attacking the RSA algorithm are: brute force, timing attacks, _________ attacks, and chosen ciphertext attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
The Secure Hash Algorithm (SHA) was developed by the _________ and published as a federal information processing standard (FIPS 180) in 1993.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186, known as the __________.

A) XOR
B) MD5
C) MAC
D) DSS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
______ has been issued as RFC 2014, has been chosen as the mandatory-to-implement MAC for IP Security, and is used in other Internet protocols, such as Transport Layer Security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
One of the first public-key schemes, _______, was developed in 1977 by Ron Rivest, Adi Shamir, and Len Adleman.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
Although the _________ attack is a serious threat, there are simple countermeasures that can be used such as constant time calcs, random delays or blinding computations.

A) timing
B) chosen ciphertext
C) mathematical
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
A __________ type of attack exploits properties of the RSA algorithm.

A) timing
B) brute-force
C) chosen ciphertext
D) mathematical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
One of the simplest hash functions is the ________ of every block.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
The evaluation criteria for the new hash function are: security, _______, and algorithm and implementation characteristics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.

A) Digital standards
B) Mathematical attacks
C) Ciphers
D) Timing attacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
"Must support hash value lengths of 224, 256,384, and 512 bits" and "algorithm must process small blocks at a time instead of requiring the entire message to be buffered in memory before processing it" are requirements for ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
The security of any MAC function based on an embedded hash function depends in some way on the _________ strength of the underlying hash function.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
Perhaps the most widely used public-key algorithms are _________ and Diffie-Hellman.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
If speed is a concern, it is fully acceptable to use _________ rather than SHA as the embedded hash function for HMAC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
The purpose of the algorithm is to enable two users to exchange a __________ securely that can then be used for subsequent encryption of messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.