Cryptography and Network Security

Computing

Quiz 12 :

Message Authentication Codes

Quiz 12 :

Message Authentication Codes

Question Type
search
arrow
A recipient in possession of the secret key cannot generate an authentication code to verify the integrity of the message.
Free
True False
Answer:

Answer:

False

Tags
Choose question tag
close menu
arrow
A __________ is an algorithm that requires the use of a secret key.
Free
Multiple Choice
Answer:

Answer:

D

Tags
Choose question tag
close menu
arrow
An important characteristic of the MAC algorithm is that it needs to be reversible.
Free
True False
Answer:

Answer:

False

Tags
Choose question tag
close menu
arrow
A brute-force attack on a MAC is easier than a brute-force attack on a hash function.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the __________ mode of operation is designed to be parallelizable so that it can provide high throughput with low cost and low latency.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Confidentiality can be provided by performing message encryption __________ the MAC algorithm.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
_________ encryption provides authentication among those who share the secret key.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
the security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the order in which the frame check sequence and encryption functions are performed is not critical for authentication.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Message encryption by itself cannot provide a measure of authentication.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Message authentication is a mechanism or service used to verify the integrity of a message.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Message authentication may also verify sequencing and timeliness.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the straightforward use of public-key encryption provides confidentiality and authentication.
True False
Answer:
Tags
Choose question tag
close menu
arrow
As with encryption algorithms and hash functions cryptanalytic attacks on MAC algorithms seek to exploit some property of the algorithm to perform some attack other than an exhaustive search.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Insertion of messages into the network from a fraudulent source is a __________ attack.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
If the calculated frame check sequence is equal to the incoming frame check sequence the message is considered authentic.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the MAC does not provide a digital signature because both sender and receiver share the same key.
True False
Answer:
Tags
Choose question tag
close menu
arrow
A CtR-based authenticated encryption approach is the most efficient mode of operation for high-speed packet networks.
True False
Answer:
Tags
Choose question tag
close menu
arrow
to attack MD5, the attacker can choose any set of messages and work on these offline on a dedicated computing facility to find a collision.
True False
Answer:
Tags
Choose question tag
close menu
arrow
One means of forming a MAC is to combine a cryptographic hash function in some fashion with a secret key.
True False
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 45