Chap5&6 Flashcards

1
Q

How does MAC assure the receiver that the message received is not changed?

A

If an attacker changes the message but not the MAC, the receiver will calculate a different MAC from
the MAC received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why can’t the attacker also change the MAC?

A

The symmetric key is known only to the sender and receiver
* The attacker does not have the key to calculate and replace the MAC after changing the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does MAC assure the receiver the message is from the correct sender?

A

The symmetric key is known only to the sender and receiver.
* Only the sender is able to use the key to calculate the MAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the calculation of MAC differ from symmetric algorithm?

A

Symmetric algorithm: reversible, involves both encryption and decryption
* MAC: one-way (irreversible), involves only encryption
24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the key difference between a message digest (MD) and a message authentication code
(MAC)?

A
  • MD provides data integrity but does not provide data origin authentication
  • MAC provides both data integrity and data origin authentication
    25
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the disadvantages of using HMAC?

A

The biggest drawback is HMAC’s reliance on symmetric secret key
* Symmetric key exchange problem
* Multiple recipients: using multiple symmetric keys needs key management
* Multiple recipients: using single shared key has authentication problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can HMAC be used as a digital signature? Why?

A
  • No.
  • Both sender and receiver has the same symmetric key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly