Chapter 13: Digital Signatures
Chapter 13: Digital Signatures
Stallings
TRUE OR FALSE
T F 1. A digital signature can guarantee the integrity but not the source of
the message.
T F 5. The ElGamal signature scheme involves the use of the public key
for encryption and the private key for decryption.
T F 12. The main work for signature generation depends on the message
and is done during the idle time of the processor.
T F 13. Unlike RSA, DSS cannot be used for encryption or key exchange.
Cryptography and Network Security: Principles and Practice, 6 th Edition, by William
Stallings
T F 14. The global public key components of DSA are the same as for the
Schnorr signature scheme.
T F 15. The first part of the Schnorr digital signature scheme is the
generation of a private/public key pair.
MULTIPLE CHOICE
1. The __________ is formed by taking the hash of the message and encrypting the
message with the creator's private key.
3. The digital signature standard is a __________ standard that uses the secure
hash algorithm.
A. IEEE B. NIST
C. ISO D. ITIL
4. With a __________ attack the attacker is given access to a set of messages and
their signatures.
8. The _________________, which is the latest of the RSA schemes, is the one that
RSA Laboratories recommends as the most secure of the RSA schemes.
A. RSA-PSS B. ECDSA
C. DSA-SDS D. EDSDS
C. DSA D. timestamp
10. In the __________ approach only the sender knows the private key so only the
sender could have produced a valid signature.
A. EDS B. DSA
C. DSS D. RSA
Cryptography and Network Security: Principles and Practice, 6 th Edition, by William
Stallings
11. The ____________ components of DSA are the same as in the Schnorr
signature scheme.
12. To create a __________ a user calculates two quantities, r and s, that are
functions of the public key components (p, q, g), the user's private key (x),
the hash code of the message H(M), and an additional integer k that should
be generated randomly or pseudorandomly and be unique for each signing.
A. Rabin B. SHA-1
C. ElGamal D. Schnorr
14. With a __________ attack the attacker is allowed to use the user as an "oracle".
This means that the user may request signatures of messages that depend on
previously obtained message-signature pairs.
4. A digital signature must have the following properties: it must verify the
author and the date and time of the signature; it must authenticate the
contents at the time of the signature; and it must ____be verifiable by 3 rd
parties_______ to resolve disputes.
5. The DSS makes use of the Secure Hash Algorithm and presents a new digital
signature technique known as the ______DSA________ .
11. The message dependent part of the Schnorr digital signature generation
requires multiplying a __________ with an n-bit integer.
12. In addition to the NIST Digital Signature Algorithm and ECDSA, the 2009
version of FIPS 186 also includes several techniques based on ____DSA_____ ,
all of which were developed by RSA Laboratories and are in wide use.
Cryptography and Network Security: Principles and Practice, 6 th Edition, by William
Stallings
13. The _________ is based on the difficulty of computing discrete logarithms and
is based on schemes originally presented by ElGamal and Schnorr.
14. FIPS 186 -3 incorporates digital signature algorithms based on RSA and on
_____eliptic curve_____ cryptography.