Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Context The following questions deal with the theory of modern ciphers and modern cryptography. The topics are: ( pseudo ) random numbers security exchange of

Context
The following questions deal with the theory of modern ciphers and modern cryptography. The topics are:
(pseudo)random numbers
security
exchange of keys
modern block and flow symmetric ciphers
asymmetric cryptography
applications of cryptography
Claims
1.\geoquad It is possible to generate a truly random sequence of numbers on a fully deterministic computer.
2.\geoquad Operating systems enable the generation of real random numbers.
3.\geoquad It is possible to obtain a cryptographically secure source of pseudorandom numbers using block ciphers.
4.\geoquad Most random number generators are cryptographically secure in practice.
5.\geoquad A code can have a security higher than the number of bits of the key.
6.\geoquad A one-time notebook is the only perfectly secure code.
7.\geoquad Exchanging keys for a disposable notebook is easy.
8.\geoquad With a disposable notebook, the cipher is obtained from the plain text by applying an operation to the bits
XAND (exclusive I).
9.\geoquad RC4 is a usable stream cipher today.
10.\geoquad Feistel's network is a stream code in itself.
11.\geoquad The substitution and permutation network (SPN) and the Feistel network are the basic architectures of modern block
codes.
12.\geoquad Substitution and permutation network (SPN) and Feistel network are synonyms.
13.\geoquad We call a code a block code if it encrypts bytes of different lengths.
14.\geoquad DES has an 8-byte key of 56 bits.
15.\geoquad 3DES is a cipher based on the Feistel network.
16.\geoquad AES has a key length of 64 bits.
17.\geoquad AES is a usable cipher today.
18.\geoquad AES has keys of length 128 and more bits.
19.\geoquad ECB mode is a monoalphabetic code.
20.\geoquad CBC (cipher-block chaining) mode of block ciphers is useful for encrypting files.
21.\geoquad CFB (cipher-feedback) mode of block ciphers uses an initialization vector that is communicated independently of
password.
22.\geoquad CTR (counter) mode of block ciphers is a good random number generator (CSPRNG).
23.\geoquad The cryptographic hash function must be resistant to finding multiple patterns that give the same hash.
24.\geoquad MD5 is today a cryptographically secure hash.
25.\geoquad There are very good hash functions (for some applications) that are unusable cryptographically.
26.\geoquad HMAC is the only form of Message Acknowledgment Code (MAC) used in practice.
27.\geoquad The Merkle puzzle roughly consists of sending a "bunch" of problems to the other side, which
then it chooses which problem to solve and the solution of that problem contains the shared secret key.
28.\geoquad The Diffie-Hellman-Merkle protocol provides security close to the number of bits of the prime number on which it is based.
29.\geoquad The Diffie-Hellman-Merkle protocol uses huge prime numbers in practice.
30.\geoquad Asymmetric cryptography is based on the idea that some mathematical operations have a large difference in efficiency
between the operation itself and its inverse.
31.\geoquad The factorization problem of large integers is a cryptographically difficult problem.
32.\geoquad With asymmetric cryptography, the public key should be handled carefully.
33.\geoquad In order to make a message secret with asymmetric cryptography, we encrypt it publicly and decrypt it secretly
key.
34.\geoquad A digital signature is generally impossible to forge.
35.\geoquad A digital signature essentially consists of encrypting the message hash with a secret key.
36.\geoquad IPv6 has a built-in form of security (IPSEC) based on cryptography.
37.\geoquad Smart cards (cards with chips) are based on symmetric cryptography.
38.\geoquad SSL is a quality protocol at the application level.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Put Your Data To Work 52 Tips And Techniques For Effectively Managing Your Database

Authors: Wes Trochlil

1st Edition

0880343079, 978-0880343077

More Books

Students also viewed these Databases questions