ExamGecko
Question list
Search
Search

Related questions











Question 545 - 312-50v12 discussion

Report
Export

Your company, Encryptor Corp, is developing a new application that will handle highly sensitive user information. As a cybersecurity specialist, you want to ensure this data is securely stored. The development team proposes a method where data is hashed and then encrypted before storage. However, you want an added layer of security to verify the integrity of the data upon retrieval. Which of the following cryptographic concepts should you propose to the team?

A.
Implement a block cipher mode of operation.
Answers
A.
Implement a block cipher mode of operation.
B.
a digital signature mechanism.
Answers
B.
a digital signature mechanism.
C.
Suggest using salt with hashing.
Answers
C.
Suggest using salt with hashing.
D.
Switch to elliptic curve cryptography.
Answers
D.
Switch to elliptic curve cryptography.
Suggested answer: B

Explanation:

A digital signature mechanism is a cryptographic concept that you should propose to the team to verify the integrity of the data upon retrieval. A digital signature mechanism works as follows:

A digital signature is a mathematical scheme that allows the sender of a message to sign the message with their private key, and allows the receiver of the message to verify the signature with the sender's public key. A digital signature provides two security services: authentication and non-repudiation.Authentication means that the receiver can confirm the identity of the sender, and non-repudiation means that the sender cannot deny sending the message12.

A digital signature mechanism consists of three algorithms: key generation, signing, and verification. Key generation produces a pair of keys: a private key for the sender and a public key for the receiver. Signing takes the message and the private key as inputs, and outputs a signature.Verification takes the message, the signature, and the public key as inputs, and outputs a boolean value indicating whether the signature is valid or not12.

A digital signature mechanism can be implemented using various cryptographic techniques, such as hash-based signatures, RSA signatures, or elliptic curve signatures. A common method is to use a hash function to compress the message into a fixed-length digest, and then use an asymmetric encryption algorithm to encrypt the digest with the private key.The encrypted digest is the signature, which can be decrypted with the public key and compared with the hash of the message to verify the integrity12.

A digital signature mechanism can ensure the integrity of the data upon retrieval, because:

A digital signature is unique to the message and the sender, and it cannot be forged or altered by anyone else.If the message or the signature is modified in any way, the verification will fail and the receiver will know that the data is corrupted or tampered with12.

A digital signature is independent of the encryption or hashing of the data, and it can be applied to any type of data, regardless of its format or size. The encryption or hashing of the data can provide confidentiality and efficiency, but they cannot provide integrity or authentication by themselves.A digital signature can complement the encryption or hashing of the data by providing an additional layer of security12.

The other options are not as suitable as option B for the following reasons:

A) Implement a block cipher mode of operation: This option is not relevant because it does not address the integrity verification issue, but the encryption issue. A block cipher mode of operation is a method of applying a block cipher, which is a symmetric encryption algorithm that operates on fixed-length blocks of data, to a variable-length message. A block cipher mode of operation can provide different security properties, such as confidentiality, integrity, or authenticity, depending on the mode.However, a block cipher mode of operation cannot provide a digital signature, which is a form of asymmetric encryption that uses a pair of keys3.

C) Suggest using salt with hashing: This option is not sufficient because it does not provide a digital signature, but only a hash value. Salt is a random value that is added to the input of a hash function, which is a one-way function that maps any data to a fixed-length digest. Salt can enhance the security of hashing by making it harder to perform brute-force attacks or dictionary attacks, which are methods of finding the input that produces a given hash value. However, salt cannot provide a digital signature, which is a two-way function that uses a pair of keys to sign and verify a message .

D) Switch to elliptic curve cryptography: This option is not specific because it does not specify a digital signature mechanism, but only a type of cryptography. Elliptic curve cryptography is a branch of cryptography that uses mathematical curves to generate keys and perform operations. Elliptic curve cryptography can be used to implement various cryptographic techniques, such as encryption, hashing, or digital signatures. However, elliptic curve cryptography is not a digital signature mechanism by itself, but rather a tool that can be used to create one .

1: Digital signature - Wikipedia

2: Digital Signature: What It Is and How It Works | Kaspersky

3: Block cipher mode of operation - Wikipedia

: Block Cipher Modes of Operation - an overview | ScienceDirect Topics

: Salt (cryptography) - Wikipedia

: What is Salt in Cryptography? | Cloudflare

: Elliptic-curve cryptography - Wikipedia

: Elliptic Curve Cryptography: What It Is and How It Works | Kaspersky

asked 18/09/2024
Andrey Baturov
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first