logo

Crowdly

Browser

Add to Chrome

25-26 IY2760/DC3760: Introduction to Information Security

Looking for 25-26 IY2760/DC3760: Introduction to Information Security test answers and solutions? Browse our comprehensive collection of verified answers for 25-26 IY2760/DC3760: Introduction to Information Security at moodle.royalholloway.ac.uk.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Pick all the attack(s) that can be detected using a message authentication code.  Marks may be deducted for wrong choices.

0%
0%
0%
0%
0%
View this question

Pick all the true statements on risk analysis.

0%
0%
0%
0%
0%
View this question

Suppose we want to keep the data on our system confidential.  What might be the most effective security controls?  (Pick two answers.)

0%
0%
100%
100%
View this question

How does the station-to-station (STS) protocol defend against the intruder-in-the-middle attack in the Diffie-Hellman protocol?

100%
0%
0%
0%
View this question

Suppose Alice and Bob performs the Diffie-Hellman key exchange, using the public parameters with prime and primitive element .

Alice chooses her secret and Bob chooses his secret .

What does Alice send to Bob and why? (You may assume all the arithmetic is correct.)

0%
0%
0%
0%
View this question

In this key establishment protocol, 

  • interacts with a trusted server and a party .  
  • and share a symmetric key , and and share a symmetric key .  
  • will choose a key to be shared by and .
  • and are random numbers chosen by and respectively.
  • We will write to mean encrypting a message using a symmetric key encryption algorithm with key .

The protocol runs as follows:

  1. , , .
  2. : .
  3. : .
  4. : .
  5. : .

Which message, if any, provides confirmation to that the key is possessed by  ?  Pick only one answer.

0%
0%
0%
100%
0%
0%
View this question

Suppose Alice has an RSA signature scheme with hash function , with the following values:

and 

Suppose Alice has signing key .

Suppose Alice wants to send Bob a message which has hash value .  She sends and her RSA signature to Bob.

What does Bob do to decide whether to accept this as a valid signature?  

0%
0%
0%
0%
0%
View this question

Suppose Alice has an RSA signature scheme, with the following values:

and 

Suppose Alice has signing key .

Pick all the values that must be kept private and known only to Alice. (Marks may be deducted for incorrect choices.)

0%
0%
0%
0%
0%
View this question

Pick all the correct statements about a digital signature scheme. (Marks may be deducted for incorrect choices.)

0%
0%
0%
0%
View this question

When Alice wants to log into the music streaming service Tunes-R-Us, she signs in using her Security-R-Us credentials.

Who is the relying party? 

100%
0%
0%
View this question

Want instant access to all verified answers on moodle.royalholloway.ac.uk?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome