Networking - security - multichoice questions

Question 1

Consider the following handshake process:

  1. Server sends a certificate to the client.
  2. Client generates public-private key pair.
  3. Client encrypts the master-key with the generated public key.
  4. Client sends the encrypted master-key to the server.

What is wrong with the described handshake?

Question 2

Self-signed certificate are useful for:

Question 3

Choose the correct sentences:

Question 4

Which of the following properties of hash function is violated for the below hash function?

f(x) = x + 5

E.g.
f(4) = 9
f(7) = 12

Question 5

When data is encrypted using a private key:

Question 6

In typical client-server communication (choose all the correct sentences):

Question 7

Consider the below encryption scheme, which make Certificate authority redundant:

  1. Alice encrypts her public key using her own private key
  2. Alice sends the encrypted content to Bob
  3. Bob decrypt Alice's message using her public key
  4. Bob generates a random symmetric key, decrypt it using Alice's public key, and sends to Alice

What is the first step that can be intruded by Eve:

Question 8

In order to verify the authenticity of messages from Alice, Bob basically needs:

Question 9

Consider the below authenticity scheme:

  1. Alice creates a plaintext file
  2. Alice signs the plaintext file using her own public key
  3. Alice sends the signature along with the original plaintext
  4. Bob verify the message sent by Alice using Alice's public key

What is wrong in the above scheme?

Question 10

Assume message.txt is a file containing plaintext message from Alice, and signature.txt is a valid signature of messages.txt, signed by Alice's private key.

What is wrong in the below command, ran in Bob's machine:

openssl dgst -sha256 -verify private.key -signature signature.txt message.txt