Authentication Requirement, Authentication Function Flashcards

(16 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of authentication in communication?

A

To verify the origin and authenticity of a document or message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What must authentication be able to verify?

A
  • The message came from the apparent source or author.
  • The contents have not been altered.
  • Sometimes, the message was sent at a specific time or in a certain sequence.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attack does authentication protect against?

A

Active attacks such as falsification of data and transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two levels of authentication functionality?

A
  • Lower Level: Produces an authenticator (value used to authenticate a message).
  • Higher Level: Uses the authenticator to verify message authenticity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the types of functions that may be used to produce an authenticator?

A
  • Message encryption
  • Message authentication code (MAC)
  • Hash function
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is message authentication achieved using encryption?

A

The ciphertext of the entire message serves as its authenticator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a MAC?

A

A function of the message and a secret key that produces a fixed-length value for authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is a MAC used in communication?

A
  • MAC = F(K, M) is calculated.
  • MAC is appended to the message.
  • Receiver recomputes MAC and compares it to the received MAC.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does successful MAC verification assure?

A

The message is from the claimed sender and has not been altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is DES used in MAC?

A

It encrypts the message, and the last 16 or 32 bits of ciphertext are used as the MAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a one-way hash function?

A

A function that takes a variable-size message and returns a fixed-size message digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Does a one-way hash function use a secret key?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does using conventional encryption with a hash function ensure authenticity?

A

The message digest is encrypted using a shared secret key, ensuring only sender and receiver can verify authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does public-key encryption of a hash ensure authentication?

A
  • Provides a digital signature.
  • Removes the need to distribute secret keys between parties.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is a secret value used in hashing for authentication?

A
  • A and B share a secret value SAB.
  • Sender computes MDM = H(SAB || M) and sends [M || MDM].
  • Receiver verifies by computing the same hash.