Tech 3498 Ch 21

Ace your homework & exams now with Quizwiz!

chosen ciphertext

A __________ type of attack exploits properties of the RSA algorithm. Group of answer choices timing brute-force chosen ciphertext

True

A hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret key. Group of answer choices True False

timing

Although the _________ attack is a serious threat, there are simple countermeasures that can be used such as constant time calcs, random delays or blinding computations. Group of answer choices timing chosen ciphertext mathematical none of the above

True

Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES. Group of answer choices True False

SHA-1

In 2005, NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHA versions by 2010. Group of answer choices SHA-1 SHA-512 SHA-256 SHA-2

True

SHA-2 shares the same structure and mathematical operations as its predecessors and this is a cause for concern. Group of answer choices True False

SHA-1

The DSS makes use of the _________ and presents a new digital signature technique, the Digital Signature Algorithm (DSA). Group of answer choices HMAC XOR RSA SHA-1

True

The Diffie-Hellman algorithm depends for its effectiveness on the difficulty of computing discrete logarithms. Group of answer choices True False

DSS

The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186, known as the __________. Group of answer choices XOR MD5 MAC DSS

timing

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time. Group of answer choices mathematical timing chosen ciphertext brute-force

RSA

The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption. Group of answer choices SHA-1 HMAC MD5 RSA

DSS

The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange. Group of answer choices ECC RSA DSS XOR

True

The appeal of HMAC is that its designers have been able to prove an exact relationship between the strength of the embedded hash function and the strength of HMAC. Group of answer choices True False

True

The key exchange protocol is vulnerable to a man-in-the-middle attack because it does not authenticate the participants. Group of answer choices True

True

The one-way hash function is important not only in message authentication but also in digital signatures. Group of answer choices True False

False

The operations performed during a round consist of circular shifts, and primitive Boolean functions based on DSS, MD5, SHA, and RSA. Group of answer choices True False

ECC

The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead. Group of answer choices ECC MD5 Diffie-Hellman none of the above

False

Timing attacks are only applicable to RSA. Group of answer choices True False

True

Unlike RSA, DSS cannot be used for encryption or key exchange. Group of answer choices True False

Timing attacks

_________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number. Group of answer choices Digital standards Mathematical attacks Ciphers Timing attacks

Mathematical

_________ attacks have several approaches, all equivalent in effort to factoring the product of two primes. Group of answer choices Mathematical Brute-force Chosen ciphertext

Diffie-Hellman

___________ was the first published public-key algorithm. Group of answer choices NIST Diffie-Hellman RC4 RSA

brute-force

A ________ attack involves trying all possible private keys. Group of answer choices mathematical timing brute-force chosen ciphertext

True

HMAC can be proven secure provided that the embedded hash function has some reasonable cryptographic strengths. Group of answer choices True False

HMAC

Issued as RFC 2104, __________ has been chosen as the mandatory-to-implement MAC for IP Security. Group of answer choices RSA SHA-3 DSS

True

RSA is a block cipher in which the plaintext and ciphertext are integers between 0 and n ? 1 for some n. Group of answer choices True False

True

SHA is perhaps the most widely used family of hash functions. Group of answer choices True False

False

SHA-1 is considered to be very secure. Group of answer choices True False

160

SHA-1 produces a hash value of __________ bits. Group of answer choices 256 160 384 180

True

SHA-3 algorithms must be designed to resist any potentially successful attack on SHA-2 functions. Group of answer choices True False


Related study sets

ACCT Chapter 7 Internal Control and Cash

View Set

20-21 FallSem ap chem final exam

View Set

Chapter 24: Asepsis and Infection Control

View Set

CCNA routing and switching chapter 8 and 9

View Set

Chapter 2 Validity, Reliability, and Objectivity

View Set

Accounting Chapter 3 Temporary & Permanent Accounts

View Set