In: Computer Science
II: Select/provide the correct term for the following statements.(1*5=5pts)
6.Because of the mathematical properties of the message authentication code function it is less vulnerable to being broken than encryption.(True/False)
7.Cryptographic hash functions generally execute slower in software than conventional encryption algorithms such as DES. (True/False)
8.Public-key algorithms are based on mathematical functions rather than on simple operations on bit patterns. (True/False)
9.With two keys used, the public-key encryption provides a stronger protection than the single-key/symmetricencryption. (True/False)
10.Message authentication code (MAC) and digital signature are two possible methods that provide origin authentication, data integrity, and non-repudiation. (True/False)
6.Because of the mathematical properties of the message authentication code function it is less vulnerable to being broken than encryption.(True/False)
Answer: True
7.Cryptographic hash functions generally execute slower in software than conventional encryption algorithms such as DES. (True/False)
Answer: False
8.Public-key algorithms are based on mathematical functions rather than on simple operations on bit patterns. (True/False)
Answer: True
9.With two keys used, the public-key encryption provides a stronger protection than the single-key/symmetric encryption. (True/False)
Answer: True
In symmetric encryption, we use only one key for both encryption and decryption. It is simplex and executes faster with lesser security. On the other hand public-key encryption also known as assymetric-key encryption is complex for execution as it takes two keys for encryption. Also, protects the data in high manner when compared to the symmetric encryption.
10.Message authentication code (MAC) and digital signature are two possible methods that provide origin authentication, data integrity, and non-repudiation. (True/False)
Answer: False
Cryptographic primitive | MAC | Digital
Security Goal | | signature
------------------------+------+----------------+--------
Integrity | Yes | Yes
Authentication | Yes | Yes
Non-repudiation | No | Yes
------------------------+------+-----------+-------------