CS442 - Chapter 13

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

________ is when a signature is forged for any available message.

existential forgery

True or False: DSA security does not depend on discrete logs.

false

True or False: Digital signatures do not provide the ability to authenticate message contents.

false

True or False: Direct Digital Signatures do not only involve sender and receiver.

false

True or False: In elliptic curve DSA, users all have different global domain parameters.

false

True or False: The security of Schnorr digital signatures does not depend on discrete logs.

false

True or False: There was proof of RSA security prior to PSS.

false

ElGamal signatures use exponentiation in a _______ field.

galois

The process for MGF is to repeatedly use the hash function until the string length is _________ the mask length.

greater than or equal to

Schnorr minimizes the message dependent computation because the main part can be done in _________.

idle time

A _________ (MGF) is used in RSA PSS.

mask generation function

Which of these is not a type of attack given for digital signatures? > key-only > known-message > generic chosen message > masquerade > directed chosen message > adaptive chosen message

masquerade

The parameters in elliptic curve DSA define the elliptic curve and the ________.

point of origin

The digital signature for a direct digital signature is the message or hash sent with a ________ key.

private

The RSA _________ (PSS) is the most secure of RSA.

probabilistic signature scheme

Why does MAC or cipher not work for a digital signature?

provides authentication but no protection of two parties against each other

DSA keys are generated by the user choosing a _________ private key and computing the public key.

random

_________ is when signatures are forged for a specific message.

selective forgery

The process followed by direct digital signatures is ________.

sign then encrypt

In ElGamal signatures, the private key is for ________ and the public key is for ________.

signing; verification

DSA is _________ and _________ than RSA.

smaller; faster

In Schnorr signatures, p is typically 1024-bits and q is typically _________-bits.

160

Schnorr message dependent computation is the product of a _________-bit integer and a _________-bit integer.

2n; n

The Digital Signature Standard (DSS) uses the __________ hash.

SHA

Direct digital signatures provide _______ and _______,

confidentiality; validity

MGF is usually based on a ________, such as SHA-1.

cryptographic hash

A _________ attack is when a list of messages to be signed is chosen after the recipient knows the key but before signatures are seen.

directed chosen message

A ________ attack is a request for signatures of messages that depend on previously obtained message-signature pairs.

adaptive chosen message

Digital signatures provide the ability to verify the _______, _______, and _________.

author; date; time

Types of forgeries include ________, universal forgery, selective forgery, and existential forgery.

total break

True or False: A signature must be a bit pattern that depends on the message being signed.

true

True or False: DSA is a variant of ElGamal and Schnorr.

true

True or False: DSS is a public key scheme and is digital signature only (unlike RSA).

true

True or False: Digital signatures are required to be easy to produce, recognize, and verify.

true

True or False: Digital signatures do not address issues of lack of trust.

true

True or False: Digital signatures must authenticate message contents at the time of the signature.

true

True or False: Digital signatures must be practical to store and computationally infeasible to forge.

true

True or False: Digital signatures provide the ability to verify by third party to resolve disputes.

true

True or False: ElGamal signatures depend on the difficulty of computing discrete logarithms.

true

True or False: In direct digital signatures, it is assumed that the receiver has the sender's public key.

true

True or False: PSS includes a randomization process.

true

True or False: Schnorr digital signatures use exponentiation in a finite Galois field.

true

True or False: The algorithm used in DSS is DSA.

true

True or False: The signature in elliptic curve DSA is generated with the private key, parameters, and hash value.

true

True or False: The signer generates the public/private key pair.

true

True or False: To deal with threats of lost/stolen/forged signatures, use a digital certificate and certificate authorities.

true

Using the sender's ________ information prevents forgery and denial.

unique

_________ is a signature reconstruction.

universal forgery


संबंधित स्टडी सेट्स

Zagadnienia społeczno-kulturowe

View Set

AQA Biology (as level) - Haemoglobin (exchange and transport systems)

View Set

Marketing Exam 4 Ch 16, 17, 18, 19, 20

View Set

Texas MPJE Review Questions (7/20/19)

View Set