MACs Flashcards

(10 cards)

1
Q

How is a tag produced?

A

Hashing a message with a secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does it mean if a MAC is secure against existential forgery?

A

If an attacker without the key can not produce a valid message-tag pair they haven’t seen before.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a length extension attack?

A

Where H(m1) can be fed into the state of a hash function. The hash function will continue from where it left off, then the attacker can feed in their own message, where the total message length is the same as m1, and it will produce a valid hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When is a MAC vulnerable to a length extension attack?

A

When the hash function used is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is Encrypt-then-MAC secure?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is MAC-then-Encrypt secure?

A

Not in general, but works in specific
instances (e.g., if encryption is CBC or CTR mode with
random IV).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is Encrypt and MAC secure?

A

Not in general, but is in some instances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the authenticated encryption game?

A

Challenger picks random encryption key
Attacker does computations, may send messages
Challenger responds with ciphertexts
Attacker does more computations, submits different ciphertext c to challenger
Attacker has won if they forged a valid ciphertext c (where MAC is correct)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What conditions must a secure authenticated encryption scheme satisfy?

A

It satisfies IND-CPA
An attacker wins the authenticated encryption game with only negligible probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does it mean when an encryption scheme is IND-CPA secure?

A

It is indistinguishable under a chosen plaintext attack. If an attacker sends 2 plaintexts and the challenger returns 1 of them encrypted. The attacker has no better than a 50% chance of determining which plaintext was encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly