Filters
Question type

Study Flashcards

Issued as RFC 2104, __________ has been chosen as the mandatory-to-implement MAC for IP Security.


A) RSA
B) SHA-3
C) DSS
D) HMAC

Correct Answer

verifed

verified

Unlike RSA, DSS cannot be used for encryption or key exchange.

Correct Answer

verifed

verified

SHA-3 algorithms must be designed to resist any potentiallysuccessful attack on SHA-2 functions.

Correct Answer

verifed

verified

The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.


A) SHA-1
B) HMAC
C) MD5
D) RSA

Correct Answer

verifed

verified

D

In 2005, NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHA versions by 2010.


A) SHA-1
B) SHA-512
C) SHA-256
D) SHA-2

Correct Answer

verifed

verified

The purpose of the algorithm is to enable two users to exchange a __________ securely that can then be used for subsequent encryption of messages.

Correct Answer

verifed

verified

secret key

The operations performed during a round consist of circularshifts, and primitive Boolean functions based on DSS, MD5, SHA, and RSA.

Correct Answer

verifed

verified

__________ are alarming for two reasons: they come from a completely unexpected direction and they are a ciphertext-only attack.

Correct Answer

verifed

verified

Cryptographic hash functions generally execute faster in softwarethan conventional encryption algorithms such as DES.

Correct Answer

verifed

verified

Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) are collectively known as _________.

Correct Answer

verifed

verified

The security of any MAC function based on an embedded hash function depends in some way on the _________ strength of the underlying hash function.

Correct Answer

verifed

verified

SHA-1 produces a hash value of __________ bits.


A) 256
B) 160
C) 384
D) 180

Correct Answer

verifed

verified

SHA-2 shares the same structure and mathematical operations as itspredecessors and this is a cause for concern.

Correct Answer

verifed

verified

SHA is perhaps the most widely used family of hash functions.

Correct Answer

verifed

verified

The key exchange protocol is vulnerable to a man-in-the-middleattack because it does not authenticate the participants.

Correct Answer

verifed

verified

Four possible approaches to attacking the RSA algorithm are: brute force, timing attacks, _________ attacks, and chosen ciphertext attacks.

Correct Answer

verifed

verified

The Secure Hash Algorithm (SHA) was developed by the _________ and published as a federal information processing standard (FIPS 180) in 1993.

Correct Answer

verifed

verified

National Institute o...

View Answer

One of the simplest hash functions is the ________ of every block.

Correct Answer

verifed

verified

XOR (bit-b...

View Answer

The evaluation criteria for the new hash function are: security, _______, and algorithm and implementation characteristics.

Correct Answer

verifed

verified

______ has been issued as RFC 2014, has been chosen as the mandatory-to-implement MAC for IP Security, and is used in other Internet protocols, such as Transport Layer Security.

Correct Answer

verifed

verified

HMAC

Showing 1 - 20 of 45

Related Exams

Show Answer