5. Authentication Protocols Flashcards

1
Q

What solves symmetric key distribution problem?

A

Public/private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to prevent Eve from creating a pair of keys pretending to be Bob?

A

Public key infrastructure
1. Web of trust
2. Trusted authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What’s the hiding property?

A

During commit phase, receiver knows nothing about x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the binding property?

A

Sender can’t change x after committing to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The binding property protects the sender.

A

False, protects the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can prevent a replay attack?

A

Nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly