ECS - Week 6 Flashcards

1
Q

What is MAC Data Authentication ?

A

The message Authentication Code is a short piece of information that can be used to verify the integrity and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is the requirement of MAC ?

A

To Prevent modifying Cypher Text (Integrity)
To prevent changing the Cyphertext & sending their own (Authentication)
These Both we require for data integrity & authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the to operations of Message Authentication Codes?

A

We have two operations :
1. Signing &
2. Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How MAC is generated ?

A

MAC is generated by using Shared key and message by Algorithm.The Output of Algorithm will be the MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is verification ?

A

Verification will be done at receivers end,Verification Algorithm takes in the MAC,message and the shared key and outputs either the message is valid or invalid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What things are required to Signing ?

A

Signing is a method to generate MAC Code,
Ciphertext and Shared key is required by the signing algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why we use MCA Code ?

A

MAC code provides message Authentication , it can be used to verify messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Verification ?

A

Message authentication uses verification method to verify the message is coming from original sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

At the receiving end what should be done first , message decryption or authentication .

A

Message Authentication done first .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What provides confidentiality ?

A

Encryption provides confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What provide data origin integration authentication ?

A

MAC provide data origin authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is asymmetric encryption

A

Asymmetric Encryption means different keys are used for encryption and decription ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How Asymmeteric Encryption/Decryption is is done ?

A

If alice wants to send messege to bob ,these steps are required,
1. Messaege converted to cyphertext
2. cyphertext is encrypted by using public key of bob.
3. messesg is sends to bob over insecure channel
4. bob now decrypts the message using his private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly