quiz7_sol - 4. Assuming that it is secure to launch attacks...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
CIS 4360 Introduction to Computer Security QUIZ 7, Fall 2011 (5 minutes only) – Not to be graded This quiz concerns some of the basics of Cryptography. 1. Cryptographic protocols are intended to let agents communicate security over an insecure network. Is this statement correct? 2. Cryptography needs physical security. To what extent is this correct? 3. A symmetric key encryption scheme is used to encrypt a large fle. Two modes oF encryp- tion are available: ECB and CBC. What do these acronyms stand For? ECB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CBC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Which one do you thing is better From a security point oF view? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 4. Assuming that it is secure to launch attacks that require 2 80 computations oF hash values, how long should the hash values be to achieve collision resistance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5. Consider the RSA signature algorithm without a hash Function, i.e. , s = m e mod n . How can an attacker Forge signatures iF there are no redundancy checks on the message m ? Mike Burmester...
View Full Document

This document was uploaded on 12/04/2011.

Ask a homework question - tutors are online