Self assessment questions Flashcards
An attack where you have a message or part thereof which is encrypted is called a
Known ciphertext attack
An attack where the attacker selects ciphertext and uses Alice’s machine to decrypt the message is called a
Chosen ciphertext attack
In RSA key generation the following holds: d*e mod φ(n) = 1 The public key is [? ] The private key is [?]
The public key is [(e, n)]
The private key is [(d,n)]
In RSA encryption of a block B is completed by calculating:
B^e mod n
In an ROC curve for a biometric what is the best possible scenario:
Curve close to the top left
In the traditional access control model by Lampon, where can the reference monitor specify authorisation control?
Both subject level and object level
What is it about digital images which makes them good cover objects for steganography?
Redundancy in the data in an image,
A small change in the least significant bits of colour channels is undetectable by the human eye
represent the BPCS algorithm:
[While there is more to hide]
[Get the next bit plane]
[While there is more space in the current bit plane]
[Get the next complex segment]
[Get the next block of payload]
[If the payload information is complex, then hide it in the current segment]
[Else conjugate by performing an exclusive or operation then hide it in the current segment]
What is BPCS Steganography?
BPCS-Steganography (Bit-Plane Complexity Segmentation Steganography)
Packet sniffing works if the attacker is [] , the network is [], and the network uses a [] or a [] in []
Packet sniffing works if the attacker is [on the same network] , the network is [insecure], and the network uses a [hub] or a [switch or router] in [promiscuous mode]
At which layers does IPSec provide security?
Network, Transport , Application
At what layers does TSL/SSL provide security?
Application