Other Public Key Cryptosystems and Cryptographic Hash Functions

This is a computer science engineering quiz on cryptography and network security, which includes questions on Other Public Key Cryptosystems and Cryptographic Hash Functions.

Start Quiz

The main difference in MACs and digital signatures is that, in digital signatures the hash value of the message is encrypted with a user’s public key.

True False

Case b ( refer Figure 1 From The chapter Message Authentication Codes in William Stallings )is an example of digital signature.

True False

What is a one-way password file?

A scheme in which the password is jumbled and stored A scheme in which the password is XOR with a key and stored A scheme in which the hash of the password is stored A scheme in which the password is passed through a PRF, which is then stored

A larger hash code cannot be decomposed into independent subcodes.

True False

In the Theta step function, which is a substitution step, each bit value changes. Each bit is dependent on _________ other bits for its new value.

13 4 7 11

Which step function provides most amount of diffusion for the Keccak iteration step?

Theta Rho Pi Chi

The Pi step function can be written as-

(x, y) × (y, (x + y)) (x, y) × (y, (2x + 3y)) (x, 2y) × (y, (2x + 3y)) (x, 2y) × (y, (x + y))

The CHI step involves which of the following gate operations?

AND and NAND AND and XOR XOR and NAND XOR and XNOR

What are the new co-ordinates for (x, y) in the Rho step for t =3?

(1, 7) (1, 4) (3, 2) none of the mentioned

Which matrix is used in the Rho/ Pi steps?

[(1 2 | 3 4)]t [(0 2 | 1 4)]t [(0 1 | 2 3)]t [(1 3 | 2 4)]t

How many bit positions are active and can affect L[0, 0] in the Iota step function?

8 12 6 7

When a hash function is used to provide message authentication, the hash function value is referred to as:

Message Field

Message Digest

Message Score

Message Leap

Message authentication code is also known as?

Key code

Hash code

Keyed hash function

Message key hash function

The Rho function is defined as : a[x, y, z] ← a[x, y, z-g(t)], where g(t) is defined as:

(t+1)(t+2)/2

(t+1)(t-2)/2

(t-1)(t-2)/2

(t-1)(t+2)/2

The Chi function is defined as:

a[x] ← a[x] XOR ( a[x + 1]XOR 1) AND a[x+2])

a[x] ← a[x] AND ( a[x + 1]XOR 1) AND a[x+2])

a[x] ← a[x] AND ( a[x + 1] XOR a[x+2])

a[x] ← a[x] XOR ( a[x + 1] AND a[x+2])

Quiz/Test Summary
Title: Other Public Key Cryptosystems and Cryptographic Hash Functions
Questions: 15
Contributed by:
james