Quiz 8 - Hashes & Security Protocols (ch21, 23) Flashcards
If the length of hash is 128 bits, then how many messages does an attacker need to search in order to find two that share the same hash? A. 128 B. 2^127 C. 2^128 D. 2^64
D
It’s much harder to launch successful collision attacks on HMAC because of secret key.
True
Security depends on the cryptographic strength of the underlying hash function.
True
The one-way hash function is important not only in message authentication but also in digital signatures.
False
SHA processes the input one block at a time but each block goes through the same processing.
True
HMAC is secure provided that the embedded hash function has good cryptographic strengths such as one-way and collision resistant.
True
The challenge values used in an authentication protocol can be repeatedly used in multiple sessions.
False
The authentication messages can be captured and replayed by an adversary.
True
Authentication can be one-way, e.g., only authenticating Alice to Bob.
True
A reflection attack is a form of man-in-the-middle attack.
True
To defeat a reflection attack, we can use an odd number as challenge from the initiator and even number from the responder.
True
We can use signing with public keys to achieve mutual authentication.
True
A session key should be a secret and unique to the session.
True
Authentication should be accomplished before key exchange.
True
A key benefit of using KDC is for scalability.
True