Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 . Choose the best answer by writing the item number ( 1 , 2 , 3 , or 4 ) in the blank box.

1. Choose the best answer by writing the item number (1,2,3, or 4) in the blank box. Cryptographic services that cannot be implemented efficiently with (duplexed) cryptographic sponges include:
Authenticated encryption with associated data.
Regular hashing.
Streaming encryption.
Availability.
2. Choose the best answer by writing the item number (1,2,3, or 4) in the blank box. Algorithms for message authentication codes can be constructed from:
Fermats Little Theorem.
Security policies.
Sources of physical entropy.
Hash functions.
3. Choose the best answer by writing the item number (1,2,3, or 4) in the blank box. Examples of sources of physical entropy for secure random number generation include:
Cryptographical sponges.
Thermal noise in semiconductors.
The current date and time.
Block ciphers in CTR mode.
4. Choose the best answer by writing the item number (1,2,3, or 4) in the blank box. What is the fundamental security hypothesis of a digital certification hierarchy?
All certificates that were revoked but have not yet expired are entirely contained in the CRL.
Certification path constraints must never refer to cross certification.
The root CA certificate is obtained through an extra-cryptographically secure, trusted channel by all interested parties.
The data formats must be specified in Abstract Syntax Notation One (ASN.1).
5. Mark all that apply by writing either T (for true) or F (for false) in the blank box before each statement. Properties of asymmetric cryptography include:
It is computationally feasible to compute the private key from the public key.
It is mathematically possible to compute the private key from the public key.
Asymmetric cryptography is typically slower than symmetric cryptography.
Transformations that depend on either key of a pair can never be inverted.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions