Cryptography final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

in the diffie hellman algorithm, the condition for selecting the value of α

(Ans: α being a primitive root of q)

In RSA, Ф(n) = _______ in terms of p and q.

(p-1)(q-1)

the number of s-boxes in AES

1

what is 13 mod 6 and -13 mod 6?

1 and 5

in SHA-512, the message is divided into blocks of size _____ bits for the hash computation

1024

calculate the GCD of 1160718174 and 316258250 using Euclidean algorithm

1160718174 = 3(316258250) + 211943424 316258250 = 211943424 + 104314826 211943424 =2(104314826) + 3313772 104314826 = 31(3313772) + 1587894 3313772 =2(1587894 )+ 137984 1587894 =11(137984 )+ 70,070 137984 = 70070 + 67914 70070 = 67914 + 2156 67914 =31( 2156) + 1078 2156 =2(1078 )+ 0

how many rounds does the AES-192 perform?

12

AES uses a _______ bit block size

128

SHA-1 produces a hash value of

160 bits

6. ø(19)

18

the defense against timing attacks on RSA includes

Blinding and Random delay

what is the encryption algorithm for Vigenere cipher?

Ci = (pi + ki) mod 26

For p = 11 and q = 5 and choose e=19. Apply RSA algorithm where message=3 and find the cipher text.

c = 37

what is the decryption algorithm for vernam cipher?

ci = pi⊕ki where pi = ith binary digit of plaintext ki = ith binary digit of key ci = ith binary digit of ciphertext

the hash function is

collision free

The defense against timing attacks on RSA includes

constant exponentiation time, random delay, and blinding

Conversion of cypher text to plaintext is

decryption

the information known to a cryptanalyst is known plaintext attack is

encryption algorithm cipher text one or more plaintext-cyphertext pairs formed with secrete key.

AES follows Fiestel structure

false

Diffie Hellman Algorithm can be used for authentication.

false

Elliptic key cryptography is a private key cryptography.

false

In RSA, we select a value 'e' such that it lies between 0 and Ф(n) and it is relatively prime to Ф(n).

false

RSA problem is defined as

finding eth roots modulo a composite n: recovering a value m such that C≡me(mod n), where(n,e)is an RSA public key and C is an RSA cipher text)

write Eulers theorem

for every a and n that are relatively prime: aø(n) 1(mod n) i.e. for any a,n where gcd(a,n)=1

the condition for the relatively prime numbers is

gcd of two numbers is 1

the full form of HMAC is

hash based message authentication code

write Fermats theorem

if p is prime and a is a positive integer not divisible by p then a^(p-1) = 1 (mod p)

The condition for "a" to be primitive root of "p"

is if a is a primitive root of the prime number p, then the numbers • a mod p,a 2 mod p, ...., a p-1 mod p are distinct and consist of the integers from 1 through p - 1 in some permutation.

Cryptology

is the study of cryptanalysis and cryptography

Euler's totient function

is written as ø(n), is defined as the number of positive integers less than n and relatively prime to n

the requirements for digital signature function includes

it must be relatively easy to produce the signature it must be relatively easy to recognize and verify the digital signature it must be computationally infeasible to forge the signature

Advantages of ECC includes________________

less memory smaller key size faster computations

MAC is a

many-to-one mapping

when a hash function is used to provide message authentication, the hash function value is referred to as

message digest

digital signatures guarantees

no alterations messages during transit authenticate message contents at the time of signature verifies author, date, and time signature

the application hash function included _________

one-way password file intrusion detection virus detection

In the RSA algorithm, two random large values 'p' and 'q'are selected. Which of the following is the property of 'p' and 'q'?

p and q should be prime

the defense against mathematical attacks on RSA include

p and q should differ in length by only a few digits both (p-1) and (q-1) should contain a large prime factor gce(p-1,q-1) should be small

Given two primes 3 and 7, use RSA to encrypt a message 4.

p=3 q=7 n=21 Ф(n)=2*6=12 let e=5 5*d mod 12=1 c= 45(mod 21)=16

In the Diffie Hellman algorithm, the condition for selecting the value of q

prime number

in Diffie-Hellman, the condition for selecting private key if global parameters are q and α

private key xA < q

Which is the largest disadvantage of the symmetric Encryption?

problem of secure transmission of the secrete key

differentiate between public key and private key

public key can be shared with everyone where as the private key must be kept secrete in order to keep the message secure. In Public key cryptography, both the public and the private keys can be used to encrypt/decrypt the message; but the corresponding key from the one used to encrypt is used to decrypt it.

the leftmost 4 bits in s-box represents the following value

row

the digital signature provides authentication to

sender and message

in "known message attack" type, the attacker has the following information

set of messages and their signatures

the requirements for hash function include

variable input fixed output one way function collision free strong collision free

The equation for calculating public key in Diffie Hellman is

yA = α ^xA mod q

the general equation used to represent elliptic curves in ECC is

y^2 = x^3 + a.x +b

Eulers totient function

ø(p) = p-1

the meaning of cryptanalytic attacks on MAC is ___________

trying to exploit some property of the algorithm

Find gcd(1970,1066) using Euclidean algorithm.

1970 = 1 x 1066 + 904 1066 = 1 x 904 + 162 904 = 5 x 162 + 94 162 = 1 x 94 + 68 94 = 1 x 68 + 26 68 = 2 x 26 + 16 26 = 1 x 16 + 10 16 = 1 x 10 + 6 10 = 1 x 6 + 4 6 = 1 x 4 + 2 4 = 2 x 2 + 0

3^201 mod 11 =

3 3201 mod 11 = (310) 20 * 31 mod 11 = 3

the number of stages in each round of AES includes

4

For p = 23 and q = 2 and choose d=3 . Apply RSA algorithm where Cipher message=2 and thus find the plain text.

8

what is the number of rounds computation steps in the SHA-512 algorithm

80

CIA Triad

Confidentiality, Integrity, Availability

another name for MAC is

Cryptographic checksum

What are elliptic curves? Why are Elliptic Curves used in the cryptography?

Elliptic curves are the curves which follow the equation y2 = x3 + a.x + b and used in the cryptography. Elliptic curves provide equivalent security for smaller key size they are used in cryptography. Also elliptic curves are faster and needs less computations. Elliptic curves require less memory. Because of the above advantages, elliptic curves are used in cryptography.

Which of the following types of cryptography should be used when minimal overhead is necessary for a mobile device?

Elliptical curve cryptography

the difference between MAC and HMAC is

HMAc algorithm is a specified type of MAC algorithm that uses a hash algorithm internally to generate MAC

Explain Euler's theorem with an example

It is a generalisation of Fermat's Theorem and states that for every a and n that are relatively prime: aø(n) 1(mod n) i.e. for any a,n where gcd(a,n)=1

what is RC4 algorithm? explain the process of encryption and decryption

It is a symmetric key encryption algorithm invented by Ron Rivest .It uses variable key size and it is a byte-oriented stream cipher .To encrypt, XOR the value k with the next byte of plaintext. Ci = Mi XOR S[k];To decrypt, XOR the value k with the next byte of ciphertext. Mi = Ci XOR S[k];

what are the types of cryptographic hash functions

MD5, SHA, RIPEMD, whirlpool

MAC stands for

Message authentication code

protection agains denial by one of the entities involved in a communication (origin, destination)is called a:

Non-Repudation

define the RSA problem

RSA problem is defined as the task of taking eth roots modulo a composite n: recovering a value m such that C ≡ me (mod n), where (n, e) is an RSA public key and C is an RSA ciphertext

the passive attack type is:

Release of message contents

AES algorithm is derived by

Rijndael

Give an example for Diffie Hellman Algorithm.

Sender & Receiver agree on prime q=353 and α=3, let xA=97, yA = α xA mod q=397 mod 353 = 40 . let xB=233 , yB= α xB mod q=3233 mod 353 = 248 KAB= yBxA mod q = 24897 mod 353= 160 ; KAB= yAxB mod q = 40233 mod 353= 160 160 is the shared key.

MACs are also called

Tags

give an example for play fair cipher

The keyword is MONARCHY Message = Move forward Plaintext = mo ve fo rw ar dx mo -> ON; ve -> UF; fo -> PH, etc Ciphertext = ON UF PH NZ RM BZ

what is the difference between mono alphabetic and poly alphabetic cipher

The monoalphabetic cipher is a permutation of a finite set of elements S is an ordered sequence of all the elements of S, with each element appearing exactly once. In mono- the relationship between cipher text and plain text is one to one. The polyalphabetic cipher improves on this by using different monoalphabetic substitutions as one proceeds through the plaintext. The polyalphabetic cipher is more complex. In a poly- one letter of plain text can be mapped to many letters of cipher text.

an intelligent threat is called

an attack, a deliberate attempt to evade security services and violate the security policy of a system.

explain the brute force attack on MAC

attack the key space and attack the MAC value

man in the middle attack can endanger security of Diffie-Hellman method if two parties are not ________

authenticated

the application of digital signature algorithm includes

authentication

The requirements for selecting random numbers in cryptography is

statistically random, uniform distribution, independent, unpredictability of future values from previous values.

the method of Caesar cipher is

substitution

the stages defined in AES encryption are

substitution bytes shift rows mixed columns and add round key

the security of Diffie-Hellman key exchange relies on which assumption?

that it is computationally infeasible to solve the discrete log problem

The meaning of brute force attack on hashing is

the adversary will try to find a value y such that h(x) = y

When a cryptographic construction provides message authenticity, what does the receiver learn

the authentication of sender and message integrity

.Why is Diffie-Hellman susceptible to man-in-the-middle attacks? Name one way to prevent such attacks?

the diffie-hellman key exchange protocol is vulnerable to man in the middle attacks because it does not authenticate the participants. this can be overcome with the use of digital signatures and public-key certificates

what is the rail fence transposition technique?

the message is written in a rectangle, row by row, and read the message off, column by column, but permute the order of the column, the order of the columns then becomes the key to the algorithm.

the number of subways in key expansion is

the number of rounds +1

in "key only attack" the attacker knows only __________

the senders public key

According to x.800 the architecture of security is

the three aspects of information security a) security attack b) security mechanism (control) c) security service

explain the brute force attack on RSA cryptosystems

this involves trying all possible private keys (d)

what is the objective of Diffie-Hellman key exchange?

to establish a shared secrete key on both sides

cryptanalysis is used

to find some insecurity in a cryptography scheme

The use of Pseudorandom Number generator is

to generate random numbers

AES is faster then 3DES

true

GCD(a,b) is the same as GCD(| a |, | b |)

true

In RSA, the values of 'e' lies between 1 and Ф(n).

true

MAC is not a digital signature

true

RC4 is a byte-oriented stream cipher.

true

digital signature algorithm makes use of secure hash algorithm

true

in hash function output length is fixed

true

incase of hashing, a collision occurs if we have x is not equal to y and H(x) = H(y)

true


Kaugnay na mga set ng pag-aaral

Biology 1406- Chapter 6 Objectives

View Set

001 Assessment of Professional Knowledge

View Set

FL Manual final exam review PRINCIPLES OF HEALTH INSURANCE

View Set

Module 9 Review Quiz: Linux installation and configuration

View Set

Acupuncture Board Exams - Points and Meridians

View Set

Nutrition Exam 3 Practice Tests Chapters 10-14

View Set