Question

In: Computer Science

Which of these characters is the bad one in cryptographic scenarios? Alice. Bo     Eve. Turing. A...

  1. Which of these characters is the bad one in cryptographic scenarios?
    1. Alice.
    2. Bo    
    3. Eve.
    4. Turing.
  2. A hash function creates a compressed digest of a message. What is that?
    1. A fixed-length sequence of bits the value of which is based upon the value of the original message.   
    2. An encryption of the original message, similar to that done by AES .
    3. The procedure that creates a message via which a man-in-the middle is executed.
    4. A substitution box used in symmetric cryptography
  3. Operating systems will store hashed passwords rather than the originals, and then compare login attempts to the hash. Why is this?
    1. Hashes are computationally efficient.
    2. Different length passwords cannot be compared.
    3. Hashes are one-way functions.
    4. All of the above.
  4. What is a digital signature?
    1. A digital scan of a signature in a document.   
    2. An encryption of the original message, similar to that done by AES.
    3. A way to authenticate the identity and contents of a message created by someone/something.
    4. Another term for a messages digest.

Solutions

Expert Solution

Q. Which of these characters is the bad one in cryptographic scenarios?

Ans: c

Because Eve is the name usually used to reffer attacker or intruder in cryptographic scenarios.

Q. A hash function creates a compressed digest of a message. What is that?

Ans: a

A fixed-length sequence of bits the value of which is based upon the value of the original message. Hash function is mathematical function which is one way in nature i.e. It is easy to calcuate hash of the variable length input but it is computionally infeasible to get input back from the hash value.

Q. Operating systems will store hashed passwords rather than the originals, and then compare login attempts to the hash. Why is this?

Ans: c

Hashes are one-way functions. Operating systems store hashed passwords rather than the originals because even in case OS gets compromised attacker can't recover the real passwors as hashes are generated by one way functions. More better technique is to add random number as salt to passwords and the store the hash to avoid dictionary attacks.

Q.  What is a digital signature?

Ans: c

A way to authenticate the identity and contents of a message created by someone/something. Digital signature is generated by first hashing the message first and then encrypting hash with senders private key. Hash autenticates the contents of message while encryption with owners private key and decryption with corresponding public key authticates the identity of owner.


Related Solutions

For which of the following scenarios would it be appropriate to use a one-sample z-test? A....
For which of the following scenarios would it be appropriate to use a one-sample z-test? A. Comparing the average weight of newborns in Hospital A to the average weight of newborns in Hospital B B. Comparing the political affiliation of ASU students against the political affiliation of all college students C. Comparing the number of packs of cigarettes smoked per day by residents of urban areas with the number of cigarettes smoked per day by all persons in the USA...
Which of the following scenarios best illustrates the substitution effect? Select one: a. Eddie goes out...
Which of the following scenarios best illustrates the substitution effect? Select one: a. Eddie goes out more after his car insurance premium (price of insurance) drops b. Gail buys more cereal when the price of milk drops c. Latisha trades in her five years old car for a new and better car d. Maggie buys a new house after she becomes a partner in a major law firm e. Ricky starts using public transportation when the price of gasoline increases
Describe two software maintenance scenarios: one in which it is more desirable to submit frequent updates...
Describe two software maintenance scenarios: one in which it is more desirable to submit frequent updates and fixes, and one in which it more advantageous to submit less frequent but more substantial updates. Provide concrete examples to illustrate the scenarios.
1). The set of all string consisting of an uppercase letter followed by zero or more additional characters, each of which is either an uppercase letter or one of the digits 0 through 9.
For this problem, Give a BNF grammar for each of the descriptions below. show that you can get a number of positive examples of the language in the constructed grammar and also show that you are not able to get a set of negative examples in the grammar. Create a parse tree for the grammar after. 1). The set of all string consisting of an uppercase letter followed by zero or more additional characters, each of which is either an...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT