Lecture 9 Flashcards
PKI & Cryptographic applications
What algorithm depends upon the computational complexity inherent in factoring large integer numbers?
RSA
_____ cryptography has a higher degree of computational requirements.
asymmetric
______ is the backbone of a large number of well-known security infrastructures
RSA
______ is based upon the computational complexity of factoring large integer numbers.
RSA
What is a super-increasing sequence?
Every element of a sequence is greater than the sum of all previous elements in the sequence.
________ depends on the ability to compute a point multiplication and the inability to compute the multiplicand given the original point and the product.
Elliptic Curve Cryptography
The problem of finding x, given P and Q is known as what?
elliptic curve discrete logarithm problem
A ______ takes a potentially long message and generates a unique output value.
Hash function
A sender generates a message digest. What must be true to verify that the message was not modified?
The recipient uses the same hash function to recompute the message digest and compare. If the 2 match the message was not altered.
What is true of a hash function?
A. Input can be any length B. output can be any length C. It is one-way D. Difficult to compute E. Output has a fixed length
A. Input can be any length
C. It is one-way
E. Output has a fixed length
_____ takes an input of any length and produces a 160-bit message digest. It processes a message in 512-bit blocks.
A. SHA-1
B. SHA-2
C. MD5
D. RSA
A. SHA-1
____ has 4 variants. It can produce a 224,256,512, or 382-bit message digest. The block size can be 512-bit bock or 1024-bit block.
A. SHA-1
B. SHA-2
C. MD5
D. RSA
B. SHA-2
Digital signatures provide for what? Select all that apply.
A. Delivery verification
B. Nonrepudiation
C. Protection again modification
B. Nonrepudiation
C. Protection again modification
NIST created ______ which specifies the approved digital signature algorithms.
Digital Signature Standard (DSS) FIPS 186-4
______ provides assurance that people are who they claim to be.
Digital Certificates