CHAPTER 12 / MESSAGE AUTHENTICATION CODES

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Message authentication is a mechanism or service used to verify the integrity of a message. (T/F)

T

2
New cards

The order in which the frame check sequence and encryption functions are performed is not critical for authentication (T/F)

F

3
New cards

The MAC does not provide a digital signature because both sender and receiver share the same key (T/F)

T

4
New cards

A recipient in possession of the secret key cannot generate an authentication code to verify the integrity of the message (T/F)

F

5
New cards

One means of forming a MAC is to combine a cryptographic hash function in some fashion with a secret key (T/F)

T

6
New cards

A brute-force attack on a MAC is easier than a brute-force attack on a hash function. (T/F)

F

7
New cards

Message authentication may also verify sequencing and timeliness. (T/F)

T

8
New cards

The security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function (T/F)

T

9
New cards

Message encryption by itself cannot provide a measure of authentication. (T/F)

F

10
New cards

If the calculated frame check sequence is equal to the incoming frame check sequence the message is considered authentic (T/F)

T

11
New cards

The straightforward use of public-key encryption provides confidentiality and authentication (T/F)

F

12
New cards

A CTR-based authenticated encryption approach is the most efficient mode of operation for high-speed packet networks (T/F)

T

13
New cards

An important characteristic of the MAC algorithm is that it needs to be reversible (T/F)

F

14
New cards

As with encryption algorithms and hash functions cryptanalytic attacks on MAC algorithms seek to exploit some property of the algorithm to perform some attack other than an exhaustive search. (T/F)

T

15
New cards

To attack MD5, the attacker can choose any set of messages and work on these offline on a dedicated computing facility to find a collision. (T/F)

T

16
New cards

_________ encryption provides authentication among those who share the secret key.

symmetric

17
New cards

Insertion of messages into the network from a fraudulent source is a __________ attack.

source repudiation

18
New cards

Confidentiality can be provided by performing message encryption __________ the MAC algorithm.

before or after

19
New cards

A __________ is an algorithm that requires the use of a secret key.

MAC

20
New cards

"Release of message contents to any person or process not possessing the

appropriate cryptographic key" is a __________ attack.

disclosure

21
New cards

With _________ authentication an opponent would have difficulty generating

ciphertext that when decrypted would have valid error control bits.

internal error control

22
New cards

The MAC function is a __________ function.

many-to-one

23
New cards

The appeal of __________ is that its designers have been able to prove an exact relationship between the strength of the embedded hash function and the strength of this form of authentication.

HMAC

24
New cards

The _________ attack is when the attacker is looking for two messages M and M1 that produce the same hash: H(M)=H(M1)

birthday

25
New cards

__________assures that data received are exactly as sent and that the purposed identity of the sender is valid.

message authentication

26
New cards

Discovery of the pattern of traffic between parties is a __________attack.

traffic analysis

27
New cards

A __________takes a variable length message and a secret key as input and produces an authentication code.

message authentication code (MAC)

28
New cards

One approach to constructing a MAC is to use a symmetric block cipher in

such a way that it produces a __________ output for a variable length input.

fixed length

29
New cards

Any modification to a sequence of messages between parties, including

insertion, deletion, and reordering is a __________ attack.

sequence modification

30
New cards

The types of functions that may be used to produce an authenticator are

grouped into three classes: hash function, message authentication code, and ___________

message encryption

31
New cards

An alternative authentication technique involves the use of a secret key to

generate a small fixed size block of data known as a __________or MAC that is appended to the message

cryptographic checksum

32
New cards

When an entire message is encrypted for confidentiality using either

symmetric or asymmetric encryption the security of the scheme generally

depends on the __________ of the key.

bit length

33
New cards

Attacks on MACs can be grouped into two categories: brute-force attacks and __________.

cryptoanalysis

34
New cards

The __________algorithm can be defined as using the cipher block chaining mode of operation of DES with an initialization vector of zero.

Data Authentication Algorithm (DAA)

35
New cards

__________is a term used to describe encryption systems that simultaneously protect confidentiality and authenticity of communications.

Authenticated encryption (AE)

36
New cards

HMAC is a widely used standardized _________function and is implemented in many protocols and applications.

MAC