MCQOPTIONS
Bookmark
Saved Bookmarks
→
Data Integrity Algorithms
→
CCM, GCM and Key Wrapping I
→
Hashing followed by encryption (H E) is used by wh...
1.
Hashing followed by encryption (H E) is used by which algorithm?
A.
IPSec
B.
SSH
C.
WEP
D.
SSL/TLS
Answer» D. SSL/TLS
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
In GCM, we define S as S = GHASH(A||0v||C||0u||[len(A)]||[len(C)]). What is u defined as?
Hashing followed by encryption (H E) is used by which algorithm?
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply
Your experience on this site will be improved by allowing cookies. Read
Cookie Policy
Reject
Allow cookies