Podcast
Questions and Answers
Which type of attack involves modifying the content of a legitimate message?
Which type of attack involves modifying the content of a legitimate message?
Which type of authentication scheme is used for authentication between two communicating parties?
Which type of authentication scheme is used for authentication between two communicating parties?
What is a MAC?
What is a MAC?
Which type of MAC can be based on hash functions or symmetric cryptosystems?
Which type of MAC can be based on hash functions or symmetric cryptosystems?
Signup and view all the answers
What is HMAC?
What is HMAC?
Signup and view all the answers
In which mode is the message encrypted in MAC based on symmetric cryptosystems?
In which mode is the message encrypted in MAC based on symmetric cryptosystems?
Signup and view all the answers
What is authenticated encryption?
What is authenticated encryption?
Signup and view all the answers
Which authenticated encryption algorithm uses Galois/Counter Mode (GCM)?
Which authenticated encryption algorithm uses Galois/Counter Mode (GCM)?
Signup and view all the answers
What is the purpose of including a timestamp in a message?
What is the purpose of including a timestamp in a message?
Signup and view all the answers
What is the purpose of a challenge/response authentication mechanism?
What is the purpose of a challenge/response authentication mechanism?
Signup and view all the answers
What is the purpose of a Trusted Third Party in authentication?
What is the purpose of a Trusted Third Party in authentication?
Signup and view all the answers
What is the CAESAR competition?
What is the CAESAR competition?
Signup and view all the answers
Which type of attack involves modifying the content of a legitimate message?
Which type of attack involves modifying the content of a legitimate message?
Signup and view all the answers
Which type of authentication scheme is used for authentication between two communicating parties?
Which type of authentication scheme is used for authentication between two communicating parties?
Signup and view all the answers
What is a MAC?
What is a MAC?
Signup and view all the answers
Which type of MAC can be based on hash functions or symmetric cryptosystems?
Which type of MAC can be based on hash functions or symmetric cryptosystems?
Signup and view all the answers
What is HMAC?
What is HMAC?
Signup and view all the answers
In which mode is the message encrypted in MAC based on symmetric cryptosystems?
In which mode is the message encrypted in MAC based on symmetric cryptosystems?
Signup and view all the answers
What is authenticated encryption?
What is authenticated encryption?
Signup and view all the answers
Which authenticated encryption algorithm uses Galois/Counter Mode (GCM)?
Which authenticated encryption algorithm uses Galois/Counter Mode (GCM)?
Signup and view all the answers
What is the purpose of including a timestamp in a message?
What is the purpose of including a timestamp in a message?
Signup and view all the answers
What is the purpose of a challenge/response authentication mechanism?
What is the purpose of a challenge/response authentication mechanism?
Signup and view all the answers
What is the purpose of a Trusted Third Party in authentication?
What is the purpose of a Trusted Third Party in authentication?
Signup and view all the answers
What is the CAESAR competition?
What is the CAESAR competition?
Signup and view all the answers
What is the purpose of a MAC in message authentication?
What is the purpose of a MAC in message authentication?
Signup and view all the answers
What is the difference between public key authentication and secret key authentication?
What is the difference between public key authentication and secret key authentication?
Signup and view all the answers
What are the three types of authentication attacks that can be prevented with MACs?
What are the three types of authentication attacks that can be prevented with MACs?
Signup and view all the answers
What are the two types of MAC schemes?
What are the two types of MAC schemes?
Signup and view all the answers
What is HMAC?
What is HMAC?
Signup and view all the answers
What is the main idea behind MAC based on hash functions?
What is the main idea behind MAC based on hash functions?
Signup and view all the answers
What is the main idea behind MAC based on symmetric cryptosystems?
What is the main idea behind MAC based on symmetric cryptosystems?
Signup and view all the answers
What are authenticated encryption algorithms?
What are authenticated encryption algorithms?
Signup and view all the answers
What is Galois/Counter Mode (GCM)?
What is Galois/Counter Mode (GCM)?
Signup and view all the answers
What is the purpose of including a timestamp in a message?
What is the purpose of including a timestamp in a message?
Signup and view all the answers
What is the purpose of a challenge/response authentication mechanism?
What is the purpose of a challenge/response authentication mechanism?
Signup and view all the answers
What is the purpose of a Trusted Third Party in authentication?
What is the purpose of a Trusted Third Party in authentication?
Signup and view all the answers
Which type of attack involves modifying the content of a legitimate message?
Which type of attack involves modifying the content of a legitimate message?
Signup and view all the answers
What is the purpose of a Message Authentication Code (MAC)?
What is the purpose of a Message Authentication Code (MAC)?
Signup and view all the answers
What is the difference between authentication using public keys and authentication using a secret key shared between two parties?
What is the difference between authentication using public keys and authentication using a secret key shared between two parties?
Signup and view all the answers
What is the main idea behind a MAC based on hash functions?
What is the main idea behind a MAC based on hash functions?
Signup and view all the answers
What is HMAC?
What is HMAC?
Signup and view all the answers
What is the main idea behind a MAC based on symmetric cryptosystems?
What is the main idea behind a MAC based on symmetric cryptosystems?
Signup and view all the answers
What is authenticated encryption?
What is authenticated encryption?
Signup and view all the answers
What is the Galois/Counter Mode (GCM)?
What is the Galois/Counter Mode (GCM)?
Signup and view all the answers
What is the purpose of a timestamp in message authentication?
What is the purpose of a timestamp in message authentication?
Signup and view all the answers
What is challenge/response in message authentication?
What is challenge/response in message authentication?
Signup and view all the answers
What is the purpose of the CAESAR competition?
What is the purpose of the CAESAR competition?
Signup and view all the answers
What is the purpose of a Trusted Third Party in message authentication?
What is the purpose of a Trusted Third Party in message authentication?
Signup and view all the answers