Question

In: Computer Science

II: Select/provide the correct term for the following statements.(1*5=5pts) 6.Because of the mathematical properties of the...

II: Select/provide the correct term for the following statements.(1*5=5pts)

6.Because of the mathematical properties of the message authentication code function it is less vulnerable to being broken than encryption.(True/False)

7.Cryptographic hash functions generally execute slower in software than conventional encryption algorithms such as DES. (True/False)

8.Public-key algorithms are based on mathematical functions rather than on simple operations on bit patterns. (True/False)

9.With two keys used, the public-key encryption provides a stronger protection than the single-key/symmetricencryption. (True/False)

10.Message authentication code (MAC) and digital signature are two possible methods that provide origin authentication, data integrity, and non-repudiation. (True/False)

Solutions

Expert Solution

6.Because of the mathematical properties of the message authentication code function it is less vulnerable to being broken than encryption.(True/False)

Answer: True

7.Cryptographic hash functions generally execute slower in software than conventional encryption algorithms such as DES. (True/False)

Answer: False

8.Public-key algorithms are based on mathematical functions rather than on simple operations on bit patterns. (True/False)

Answer: True

9.With two keys used, the public-key encryption provides a stronger protection than the single-key/symmetric encryption. (True/False)

Answer: True

In symmetric encryption, we use only one key for both encryption and decryption. It is simplex and executes faster with lesser security. On the other hand public-key encryption also known as assymetric-key encryption is complex for execution as it takes two keys for encryption. Also, protects the data in high manner when compared to the symmetric encryption.

10.Message authentication code (MAC) and digital signature are two possible methods that provide origin authentication, data integrity, and non-repudiation. (True/False)

Answer: False

Cryptographic primitive | MAC     |  Digital
Security Goal           |         |  signature
------------------------+------+----------------+--------
Integrity               |  Yes    |   Yes
Authentication          |  Yes    |   Yes
Non-repudiation         |  No     |   Yes
------------------------+------+-----------+-------------

Related Solutions

Select/provide the correct term for the following statements. 5.External devices such as firewalls cannot provide access...
Select/provide the correct term for the following statements. 5.External devices such as firewalls cannot provide access control services. (True/False) 6.The ciphertext-only attack is the easiest to defend against. (True/False) 7.A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained. (True/False) 8.The Feistel structure is a particular example of the more general structure used by all symmetric block ciphers. (True/False) 9.User authentication is the basis for most types of access control and...
47. Which of the following statements are correct? Select which option is correct. Select one or...
47. Which of the following statements are correct? Select which option is correct. Select one or more: The level of professional skepticism can be reduced where the auditor has past experience with the entity indicating the honesty and integrity of management. The level of professional skepticism needs to be maintained throughout the whole engagement. Professional skepticism implies an expectation of fraud or error, so is a biased viewpoint. Professional skepticism is not important in considering management's explanations for unusual trends...
Which of the following statements is true? Select the correct answer a.NONE OF THE STATEMENTS ARE...
Which of the following statements is true? Select the correct answer a.NONE OF THE STATEMENTS ARE TRUE b.Electric forces depend on velocity of a charged object c.Objects having a net charge experience only electric force, not magnetic force d.It is impossible to separate the North and South poles of a bar magnet e.Electric forces decrease with decreasing distance from charges, but magnetic forces do not decrease with decreasing distance from magnets
6. Select the ALL correct statements on whistleblowing. The best practice of whistleblowing is to report...
6. Select the ALL correct statements on whistleblowing. The best practice of whistleblowing is to report illegal acts to your direct manager. External investigators are a better option compared to internal audit for investigating the whistleblowing report. Whistleblowers tend to be company insiders who have a strong moral compass. It’s important to keep the whistleblower anonymous through a confidential whistleblower reporting mechanism. 7. Which example could impair independence in appearance? One of your family members is connected to a client...
Using mathematical notation where appropriate, briefly define the following properties of preferences: (i) completeness, (ii) transitivity,...
Using mathematical notation where appropriate, briefly define the following properties of preferences: (i) completeness, (ii) transitivity, (iii) monotonicity, (iv) convexity, (v) continuity and (vi) rationality
Which of the following statements are correct (Select all that apply): Select one or more: A....
Which of the following statements are correct (Select all that apply): Select one or more: A. An income statement reports on financing activities. B. A balance sheet reports on investing and financing activities. C. The statement of cash flows reports on cash flows from operating, investing, and financing activities over a period of time. D. A balance sheet reports on a company's assets and liabilities over a period of time. E. The statement of equity reports on changes in the...
Which of the following statements are correct (Select all that apply): Select one or more: A....
Which of the following statements are correct (Select all that apply): Select one or more: A. A balance sheet reports on investing and financing activities. B. An income statement reports on financing activities. C. The statement of equity reports on changes in the accounts that make up equity. D. The statement of cash flows reports on cash flows from operating, investing, and financing activities over a period of time. E. A balance sheet reports on a company's assets and liabilities...
Which of the following statements are correct in relation to M & M Proposition II with...
Which of the following statements are correct in relation to M & M Proposition II with no taxes? I. The required return on assets is equal to the weighted average cost of capital. II. Financial risk is determined by the debt-equity ratio. III. Financial risk determines the return on assets. IV. The cost of equity declines when the amount of leverage used by a firm rises.
5.         Which of the following statements concerning paying for long-term care is correct?        Thankfully Medicare covers...
5.         Which of the following statements concerning paying for long-term care is correct?        Thankfully Medicare covers the cost of long-term care no matter the patient asset level        Thankfully Medicaid covers the cost of long-term care no matter the patient asset level        Everyone should have long-term care insurance        You can self-insure for long-term care
1. Which of the following statements is (are) correct? (x) Primary markets provide a forum in...
1. Which of the following statements is (are) correct? (x) Primary markets provide a forum in which demanders of funds raise funds by issuing new financial instruments, such as stocks and bonds. (y) Primary market financial instruments include stock issues from firms allowing their equity shares to be publicly traded on stock market for the first time. We usually refer to these first-time issues as initial public offerings (z) Money markets feature debt securities or instruments with maturities of more...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT