Cryptography Week 7 Quiz Answer
Digital Signatures
Q1) The Federal Government wants to be able to issue advisories to the general public while ensuring that no one will be able to tamper with their messages or spoof a fake advisory. Which of the following is the best cryptographic approach to address this problem?
- Use a digital signature scheme, with the public key known to everyone, to sign each advisory when it is released.
- Use a message authentication code, with the key known to everyone, to generate a tag for each advisory when It is released.
- Use multiple message authentication codes, with each member of the public being given a unique key, and generate one tag per key each time an advisory is released.
- Use a public-key encryption scheme, with the public key known to everyone, and decrypt each advisory when it is released.
Q2) The president and vice president of a company want to communicate while ensuring integrity of their communication. Which of the following is the best cryptographic approach to address this problem?
- Use a digital signature scheme, with the public key known to everyone, and sign each message they send.
- Use a CPA-secure private key encryption scheme, with the key shared between them, and encrypt each message they send.
- O Use a message authentication code, with the key shared between them, and generate a tag for each message they send.
- Use a message authentication code, with the key made public, and generate a tag for each message they send.
Q3) Assume for the purposes of this question a digital signature scheme for which the time to sign a 256-bit message is 100 times slower than the time to evaluate SHA-256 on a 512-bit input. Which of the following is true if we want to sign a 500MB message M?
- We can sign M by simply hashing it, and avoid using the digital signature scheme altogether
- Signing M using the given scheme is not possible, since it only supports 256-bit messages.
- We can securely sign M by breaking it into 256-bit chunks, and signing each chunk.
- if the hash-and-sign approach is used, then signing M will take roughly the same time as hashing M.
Q4) Assume the "plain" RSA signature scheme, with public key (N = 55, e = 3). Which of the following verifies correctly as the signature on the message m = 17?
- 8
- 7
- 4
- 43
- 27
- 37
- 2
- 47
- Obtain signature o on m' = 288. Output 0 + 1 mod N as the signature on m.
- Obtain signature o on m' = 578. Output 2-1.0 mod N as the signature on m.
- Obtain signature o on m' = 288. Output o - 1 mod N as the signature on m
- Obtain signature o on m' = 17. Output (o2 mod N) as the signature on m.
- 14
- 3
- 13
- 7
Q8) (This is a continuation of the previous question.) Say the prover runs an execution of the Schnorr identification protocol with a verifier. The prover chooses r = 4 and sends A = 16. The verifler sends challenge 3. What response does the prover send?
- 3
- 7
- 13
- 4
- CertC->B, pkB, certB->A, and pkA.
- A passive eavesdropper can now learn Nc and Ng.In combination with other known information, this allows the attacker to recover mk.
- An attacker can impersonate the server by sending its own public key pk to the client. By doing so, it can convince the client to encrypt pmk again, but this time using a public key for which the attacker can decrypt.
- An attacker can eavesdrop on an execution of the protocol to learn the ciphertext c. Then, it can impersonate the client, send modified versions of c to the server, and learn pmk by using information about whether the server returns an error or not in response to these ciphertexts.
- A passive eavesdropper can now learn prk. In combination with Nc and Ns, this allows the attacker to recover mk.
1 Comments
Nice article
ReplyDelete