This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: CIS410 Quiz #1 1. What are the essential ingredients of a symmetric cipher? Plaintext, encryption algorithm, secret key, ciphertext, and decription algorithm are the five ingredients of a symmetric cipher. 2. How many keys are required for two people to communicate via a symmetric cipher? There is only one key required for two people to communicate with a symmetric cipher. 3. What are the two principle requirements for the secure use of symmetric encryption? 1 A strong encryption algorithm 2 The sender and receiver must obtain copies of the secret key in a secure manor. 4. List three approaches to message authentication. 1 Broadcasted with an associated message authentication tag. 2 Selecting messages at random to check authentication 3 With a message authentication tag attached to the message the program can check the authentication of the message whenever the authenticity is in question. 5. What is a message authentication code? Message Authentication Code (MAC) The use of a secret key to generate a small lock of data, known as a message authentication code that is appended to the message. This assumes that two communicating parties share a common secret key....
View Full Document
- Spring '11