Шукаєте відповіді та рішення тестів для 25-26 IY2760/DC3760: Introduction to Information Security? Перегляньте нашу велику колекцію перевірених відповідей для 25-26 IY2760/DC3760: Introduction to Information Security в moodle.royalholloway.ac.uk.
Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!
The biometric identification for accessing a database has a high Type II/false acceptance error. What is the main security property that might be compromised for the database?
We assume that Alice has Bob's authentic public key . The following is an authentication protocol using public key encryption techniques.
Here is a time-variant parameter and denotes a public key encryption function using key .
Which is the message (and the correct reason) that authenticates Bob to Alice?
Alice and Bob both use a (Textbook) RSA public key encryption scheme.
Suppose Bob has public key and private key .
Suppose Alice wants to encrypt a message to send to Bob using this scheme, so that only Bob can decrypt and read the message. Pick the correct statement. (We know that , and you may assume that all the arithmetic is correct!)
Suppose Alice wants to generate a public-private key pair for public key encryption.
Pick all the desirable properties of the public key encryption system. (Marks may be deducted for wrong choices.)
Suppose we have a block cipher with block size and 3-bit keys . Encryption is as follows:
where is binary bitwise addition. (So , where , . For example, . )
Alice wishes to send a message to Bob with data origin authentication, where
Suppose Alice and Bob agreed to use the above block cipher to compute CBC-MACs without the optional processing and truncating, and suppose they agree on the key .
What is the message authentication code MAC on Alice's message?
Suppose a hash function has the property of second preimage resistance. Which other property does this also imply?
Pick the correct statements. Marks may be deducted for wrong choices.
Suppose is a block cipher which uses 128-bit blocks and 192-bit keys. Suppose is a repeated use of :
In a "meet-in-the-middle" attack on , how many ciphertext are required to be stored?
Suppose we have a plaintext string to encrypt.
Suppose we have a block cipher with block size and 4-bit keys . Encryption is as follows:
where is binary bitwise addition. (So , where , . For example, . )
We can write the plaintext as , so , .
Encrypt the plaintext using the CBC mode of operation, with key and initialisation vector .