Which of the following are important differences between digital signatures and message authentication codes (MACs)? (Choose all that apply.)
a. MACs can accept messages of arbitrary length, while digital signatures are limited to messages with sizes less than the RSA modulus
b. Digital signatures can be used to calculate a signature on the encrypted message, but MACs can only be used on the plaintext message before encrypting
c. Digital signatures can enforce integrity, authenticity, and non-repudiation, but MACs can only enforce integrity and authenticity
d. A MAC depends on encrypting the hash with a shared, symmetric key, while a digital signature encrypts the hash using a private key
A,B,C,D
MAC implements integrity and authenticity while Digital signature implements integrity, authenticity, and non-repudiation
All of them are the correct differences
Which of the following are important differences between digital signatures and message authentication codes (MACs)? (Choose...
(Authentication with Alice cheating) Let’s assume Trudy is Alice’s little sister. Alice produces the message “Transfer $100,000 from Bob to Trudy’s account” and appends it with a valid signature sign(x) of Bob. She then claims that she received this message from Bob. Can Bob prove that he could not have signed this message? 1. In this problem, we will compare the security services provided by Digital Signatures (DS) and Message Authentication Codes (MAC). We assume that Trudy is able to...
Bob is trying to send an encrypted message to Alice using the Asymmetric Key approach. Which key will Bob use to encrypt the message for Alice? Alice's Private Key Bob's Public Key Alice's Public Key Bob's Private Key Alice wants to digitally sign a message so that Bob can be assured that the message came from Alice and has not been changed in transit. Which key must Alice use to encrypt the message digest? Bob's Public Key Bob's Private Key...
1.Which of the following statements about asymmetric-key encryption is correct? a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties. b Employees in the same company share the same public key. c Most companies would like to manage the private keys for their employees. d Most companies would like to use a Certificate Authority to manage the public keys of their employees. e Two of the above are correct. 2 Which...
Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...
(7) (2 pts) The simplified version of the handshaking procedure between a client and a bank server for establishing a secure connection is described below (just consider it identical to the SSL/TLS described in class): 1. A client connects to the TLS-enabled bank server requesting a secure connection, and presents a list of supported ciphers (RC4, DES, AES, etc) and hash functions (MD5, SHA-1, etc). 2. The server picks the strongest cipher and hash. It then server sends back its...