Professional Documents
Culture Documents
Chapter 3 Ex
Chapter 3 Ex
Chapter 3 Ex
Exercise 1:
Define the terms “Authenticity” and “Authentication” and explain possible factors for au-
thentication. Also, briefly describe what Two-Factor-Authentication is.
Exercise 2:
Name and explain on which points the security of password-based authentication schemes
depends.
Exercise 3:
Exercise 4:
Calculate the number of digits a passwords using the symbols a-z for each of thei digits
would need to have such that the size of the password domain is equal to that of a binary
key with 128 bits.
Exercise 5:
Exercise 6:
Describe the terms “Token”, “Smart Card” and “Biometry” and explain their use for authen-
tication.
Exercise 7:
1
Describe how public key or symmetric cryptography can be used for authentication.
Exercise 8:
Describe what a digital signature is and how it operates. Also describe how hash functions
are used in digital signatures.
Exercise 9:
Explain in detail format, composition and use of certificates. Also describe “Certificate Au-
thorities”, “Root-CA” and “Certificate Revocation”.
Exercise 10: