Looking for 25-26 IY2760/DC3760: Introduction to Information Security test answers and solutions? Browse our comprehensive collection of verified answers for 25-26 IY2760/DC3760: Introduction to Information Security at moodle.royalholloway.ac.uk.
Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!
How does the station-to-station (STS) protocol defend against the intruder-in-the-middle attack in the Diffie-Hellman protocol?
Suppose Alice and Bob performs the Diffie-Hellman key exchange, using the public parameters with prime and primitive element .
Alice chooses her secret and Bob chooses his secret .
What does Alice send to Bob and why? (You may assume all the arithmetic is correct.)
In this key establishment protocol,
The protocol runs as follows:
Which message, if any, provides confirmation to that the key is possessed by ? Pick only one answer.
Suppose Alice has an RSA signature scheme with hash function , with the following values:
and
Suppose Alice has signing key .
Suppose Alice wants to send Bob a message which has hash value . She sends and her RSA signature to Bob.
What does Bob do to decide whether to accept this as a valid signature?
Suppose Alice has an RSA signature scheme, with the following values:
and
Suppose Alice has signing key .
Pick all the values that must be kept private and known only to Alice. (Marks may be deducted for incorrect choices.)
Pick all the correct statements about a digital signature scheme. (Marks may be deducted for incorrect choices.)
When Alice wants to log into the music streaming service Tunes-R-Us, she signs in using her Security-R-Us credentials.
Who is the relying party?
The biometric identification for accessing a database has a high Type II/false acceptance error. What is the main security property that might be compromised for the database?
We assume that Alice has Bob's authentic public key . The following is an authentication protocol using public key encryption techniques.
Here is a time-variant parameter and denotes a public key encryption function using key .
Which is the message (and the correct reason) that authenticates Bob to Alice?