logo

Crowdly

Browser

Add to Chrome

25-26 IY2760/DC3760: Introduction to Information Security

Looking for 25-26 IY2760/DC3760: Introduction to Information Security test answers and solutions? Browse our comprehensive collection of verified answers for 25-26 IY2760/DC3760: Introduction to Information Security at moodle.royalholloway.ac.uk.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

How does the station-to-station (STS) protocol defend against the intruder-in-the-middle attack in the Diffie-Hellman protocol?

100%
0%
0%
0%
View this question

Suppose Alice and Bob performs the Diffie-Hellman key exchange, using the public parameters with prime and primitive element .

Alice chooses her secret and Bob chooses his secret .

What does Alice send to Bob and why? (You may assume all the arithmetic is correct.)

0%
0%
0%
0%
View this question

In this key establishment protocol, 

  • interacts with a trusted server and a party .  
  • and share a symmetric key , and and share a symmetric key .  
  • will choose a key to be shared by and .
  • and are random numbers chosen by and respectively.
  • We will write to mean encrypting a message using a symmetric key encryption algorithm with key .

The protocol runs as follows:

  1. , , .
  2. : .
  3. : .
  4. : .
  5. : .

Which message, if any, provides confirmation to that the key is possessed by  ?  Pick only one answer.

0%
0%
0%
100%
0%
0%
View this question

Suppose Alice has an RSA signature scheme with hash function , with the following values:

and 

Suppose Alice has signing key .

Suppose Alice wants to send Bob a message which has hash value .  She sends and her RSA signature to Bob.

What does Bob do to decide whether to accept this as a valid signature?  

0%
0%
0%
0%
0%
View this question

Suppose Alice has an RSA signature scheme, with the following values:

and 

Suppose Alice has signing key .

Pick all the values that must be kept private and known only to Alice. (Marks may be deducted for incorrect choices.)

0%
0%
0%
0%
0%
View this question

Pick all the correct statements about a digital signature scheme. (Marks may be deducted for incorrect choices.)

0%
0%
0%
0%
View this question

When Alice wants to log into the music streaming service Tunes-R-Us, she signs in using her Security-R-Us credentials.

Who is the relying party? 

100%
0%
0%
View this question

The biometric identification for accessing a database has a high Type II/false acceptance error.  What is the main security property that might be compromised for the database?

0%
0%
0%
0%
View this question

We assume that Alice has Bob's authentic public key .  The following is an authentication protocol using public key encryption techniques. 

  1. Bob Alice : Hi, I am Bob
  2. Alice Bob :
  3. Bob Alice :

Here is a time-variant parameter and denotes a public key encryption function using key .

Which is the message (and the correct reason) that authenticates Bob to Alice?

0%
0%
0%
0%
View this question
Which of the following measure can prevent online exhaustive search for passwords?
100%
0%
0%
0%
View this question

Want instant access to all verified answers on moodle.royalholloway.ac.uk?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome