Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Context The following questions deal with the theory of modern ciphers and modern cryptography. The topics are: ( pseudo ) random numbers security exchange of
Context
The following questions deal with the theory of modern ciphers and modern cryptography. The topics are:
pseudorandom numbers
security
exchange of keys
modern block and flow symmetric ciphers
asymmetric cryptography
applications of cryptography
Claims
geoquad It is possible to generate a truly random sequence of numbers on a fully deterministic computer.
geoquad Operating systems enable the generation of real random numbers.
geoquad It is possible to obtain a cryptographically secure source of pseudorandom numbers using block ciphers.
geoquad Most random number generators are cryptographically secure in practice.
geoquad A code can have a security higher than the number of bits of the key.
geoquad A onetime notebook is the only perfectly secure code.
geoquad Exchanging keys for a disposable notebook is easy.
geoquad With a disposable notebook, the cipher is obtained from the plain text by applying an operation to the bits
XAND exclusive I
geoquad RC is a usable stream cipher today.
geoquad Feistel's network is a stream code in itself.
geoquad The substitution and permutation network SPN and the Feistel network are the basic architectures of modern block
codes.
geoquad Substitution and permutation network SPN and Feistel network are synonyms.
geoquad We call a code a block code if it encrypts bytes of different lengths.
geoquad DES has an byte key of bits.
geoquad DES is a cipher based on the Feistel network.
geoquad AES has a key length of bits.
geoquad AES is a usable cipher today.
geoquad AES has keys of length and more bits.
geoquad ECB mode is a monoalphabetic code.
geoquad CBC cipherblock chaining mode of block ciphers is useful for encrypting files.
geoquad CFB cipherfeedback mode of block ciphers uses an initialization vector that is communicated independently of
password.
geoquad CTR counter mode of block ciphers is a good random number generator CSPRNG
geoquad The cryptographic hash function must be resistant to finding multiple patterns that give the same hash.
geoquad MD is today a cryptographically secure hash.
geoquad There are very good hash functions for some applications that are unusable cryptographically.
geoquad HMAC is the only form of Message Acknowledgment Code MAC used in practice.
geoquad The Merkle puzzle roughly consists of sending a "bunch" of problems to the other side, which
then it chooses which problem to solve and the solution of that problem contains the shared secret key.
geoquad The DiffieHellmanMerkle protocol provides security close to the number of bits of the prime number on which it is based.
geoquad The DiffieHellmanMerkle protocol uses huge prime numbers in practice.
geoquad Asymmetric cryptography is based on the idea that some mathematical operations have a large difference in efficiency
between the operation itself and its inverse.
geoquad The factorization problem of large integers is a cryptographically difficult problem.
geoquad With asymmetric cryptography, the public key should be handled carefully.
geoquad In order to make a message secret with asymmetric cryptography, we encrypt it publicly and decrypt it secretly
key.
geoquad A digital signature is generally impossible to forge.
geoquad A digital signature essentially consists of encrypting the message hash with a secret key.
geoquad IPv has a builtin form of security IPSEC based on cryptography.
geoquad Smart cards cards with chips are based on symmetric cryptography.
geoquad SSL is a quality protocol at the application level.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started