ESAT Forouzan - Chapter 30: Message Security, User Authentication and Key Management Flashcards
If user A wants to send an encrypted message to user B, the Plaintext is encrypted with the public key of _______.
a. User A
b. User B
c. The network
d. a or b
b. User B
When symmetric-key encryption is combined with private-key encryption, the _______ key is encrypted with the public key.
a. Private
b. Public
c. Symmetric
d. Skeleton
c. Symmetric
In the digital signature technique, the sender of the message uses _______ to create ciphertext.
a. His or her own symmetric key
b. His or her own private key
c. His or her public key
d. The receiver’s private key
b. His or her own private key
In the digital signature technique, the receiver of the message uses _______ to create plaintext.
a. His or her own symmetric key
b. His or her own private key
c. His or her own public key
d. The sender’s public key
d. The sender’s public key
A _______ is a trusted third party that solves the problem of symmetric-key distribution.
a. CA
b. KDC
c. TLS
d. Firewall
b. KDC
A _______ certifies the bonding between a public key and its owner.
a. CA
b. KDC
c. TLS
d. Firewall
a. CA
In a _______ attack, a message captured by an intruder is illegally sent a second time.
a. Return
b. Man-in-the-middle
c. Bucket brigade
d. Replay
d. Replay
A _______ is a large number used only once that helps distinguish a fresh authentication request from a repeated one.
a. Ticket
b. Nonce
c. Realm
d. Public key
b. Nonce
In an authentication using symmetric keys, if 10 people need to communicate, we need _______ keys.
a. 10
b. 20
c. 45
d. 90
c. 45
In the _______ protocol, the symmetric key is K = Gxy mod N, where G and N are public numbers.
a. Diffie-Hellman
b. Needham-Schroeder
c. Otway Rees
d. Kerberos
a. Diffie-Hellman
In a ________ attack, an intruder comes between two communicating parties, intercepting and replying to their messages.
a. Return
b. Man-in-the-Middle
c. Bucket-in-the-Middle
d. Replay
b. Man-in-the-Middle
A _______ is a trusted third party that establishes a symmetric key between two parties who wish to communicate.
a. KDC
b. CA
c. PKI
d. TGS
a. KDC
In the _______ protocol, a nonce is decremented by 1 so that an intruder cannot send the exact same message a second time.
a. Diffie-Hellman
b. Needham-Schroeder
c. Otway Rees
d. Kerberos
b. Needham-Schroeder
_______ is an authentication protocol that needs an authentication server and a ticket-granting server.
a. Diffie-Hellman
b. Needham-Schroeder
c. Otway Rees
d. Kerberos
d. Kerberos
The _______ is the KDC in the Kerberos protocol.
a. AS
b. TGS
c. Real server
d. Data server
a. AS