Podcast
Questions and Answers
Which type of attack involves modifying the content of a legitimate message?
Which type of attack involves modifying the content of a legitimate message?
- Timing Modification
- Impersonation
- Content Modification (correct)
- None of the above
Which type of authentication scheme is used for authentication between two communicating parties?
Which type of authentication scheme is used for authentication between two communicating parties?
- Public key authentication
- Secret key authentication (correct)
- None of the above
- Both A and B
What is a MAC?
What is a MAC?
- A piece of information that is computed from the message using a secret key and transmitted along with the message (correct)
- A piece of information that is computed from the message using a symmetric key
- None of the above
- A piece of information that is computed from the message using a public key
Which type of MAC can be based on hash functions or symmetric cryptosystems?
Which type of MAC can be based on hash functions or symmetric cryptosystems?
What is HMAC?
What is HMAC?
In which mode is the message encrypted in MAC based on symmetric cryptosystems?
In which mode is the message encrypted in MAC based on symmetric cryptosystems?
What is authenticated encryption?
What is authenticated encryption?
Which authenticated encryption algorithm uses Galois/Counter Mode (GCM)?
Which authenticated encryption algorithm uses Galois/Counter Mode (GCM)?
What is the purpose of including a timestamp in a message?
What is the purpose of including a timestamp in a message?
What is the purpose of a challenge/response authentication mechanism?
What is the purpose of a challenge/response authentication mechanism?
What is the purpose of a Trusted Third Party in authentication?
What is the purpose of a Trusted Third Party in authentication?
What is the CAESAR competition?
What is the CAESAR competition?
Which type of attack involves modifying the content of a legitimate message?
Which type of attack involves modifying the content of a legitimate message?
Which type of authentication scheme is used for authentication between two communicating parties?
Which type of authentication scheme is used for authentication between two communicating parties?
What is a MAC?
What is a MAC?
Which type of MAC can be based on hash functions or symmetric cryptosystems?
Which type of MAC can be based on hash functions or symmetric cryptosystems?
What is HMAC?
What is HMAC?
In which mode is the message encrypted in MAC based on symmetric cryptosystems?
In which mode is the message encrypted in MAC based on symmetric cryptosystems?
What is authenticated encryption?
What is authenticated encryption?
Which authenticated encryption algorithm uses Galois/Counter Mode (GCM)?
Which authenticated encryption algorithm uses Galois/Counter Mode (GCM)?
What is the purpose of including a timestamp in a message?
What is the purpose of including a timestamp in a message?
What is the purpose of a challenge/response authentication mechanism?
What is the purpose of a challenge/response authentication mechanism?
What is the purpose of a Trusted Third Party in authentication?
What is the purpose of a Trusted Third Party in authentication?
What is the CAESAR competition?
What is the CAESAR competition?
What is the purpose of a MAC in message authentication?
What is the purpose of a MAC in message authentication?
What is the difference between public key authentication and secret key authentication?
What is the difference between public key authentication and secret key authentication?
What are the three types of authentication attacks that can be prevented with MACs?
What are the three types of authentication attacks that can be prevented with MACs?
What are the two types of MAC schemes?
What are the two types of MAC schemes?
What is HMAC?
What is HMAC?
What is the main idea behind MAC based on hash functions?
What is the main idea behind MAC based on hash functions?
What is the main idea behind MAC based on symmetric cryptosystems?
What is the main idea behind MAC based on symmetric cryptosystems?
What are authenticated encryption algorithms?
What are authenticated encryption algorithms?
What is Galois/Counter Mode (GCM)?
What is Galois/Counter Mode (GCM)?
What is the purpose of including a timestamp in a message?
What is the purpose of including a timestamp in a message?
What is the purpose of a challenge/response authentication mechanism?
What is the purpose of a challenge/response authentication mechanism?
What is the purpose of a Trusted Third Party in authentication?
What is the purpose of a Trusted Third Party in authentication?
Which type of attack involves modifying the content of a legitimate message?
Which type of attack involves modifying the content of a legitimate message?
What is the purpose of a Message Authentication Code (MAC)?
What is the purpose of a Message Authentication Code (MAC)?
What is the difference between authentication using public keys and authentication using a secret key shared between two parties?
What is the difference between authentication using public keys and authentication using a secret key shared between two parties?
What is the main idea behind a MAC based on hash functions?
What is the main idea behind a MAC based on hash functions?
What is HMAC?
What is HMAC?
What is the main idea behind a MAC based on symmetric cryptosystems?
What is the main idea behind a MAC based on symmetric cryptosystems?
What is authenticated encryption?
What is authenticated encryption?
What is the Galois/Counter Mode (GCM)?
What is the Galois/Counter Mode (GCM)?
What is the purpose of a timestamp in message authentication?
What is the purpose of a timestamp in message authentication?
What is challenge/response in message authentication?
What is challenge/response in message authentication?
What is the purpose of the CAESAR competition?
What is the purpose of the CAESAR competition?
What is the purpose of a Trusted Third Party in message authentication?
What is the purpose of a Trusted Third Party in message authentication?