MCQOPTIONS
Bookmark
Saved Bookmarks
→
Cryptography and Network Security
→
Hmac Daa Cmac
→
Hashing followed by encryption (H→E) is used by..
1.
Hashing followed by encryption (H→E) is used by which algorithm?
A.
IPSec
B.
SSH
C.
WEP
D.
SSL/TLS
Answer» D. SSL/TLS
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
In GCM, we define S as S = GHASH(A||0v||C||0u||[len(A)]||[len(C)]). What is u defined as?a) 64 ceil[len(A)/128] – len(A)b) 64 ceil[len(C)/128] – len(C)c) 128 ceil[len(A)/128] – len(
What does the following figure represent?
Hashing followed by encryption (H→E) is used by which algorithm?
Which Authentication Encryption approach is taken by the SSH protocol?a) Hashing followed by encryption (H→E)b) Encryption followed by authentication (E→A)c) Authentication followed by encryption (A→E)d) Independently encrypt and authenticate (E +
Which Authentication Encryption approach is taken by the IPSec protocol?a) Authentication followed by encryption (A→E)b) Hashing followed by encryption (H→E)c) Encryption followed by authentication (E→A)d) Independently encrypt and authenticate (E +
Which Authentication Encryption approach is taken by the SSL/TLS protocol?a) Hashing followed by encryption (H→E)b) Encryption followed by authentication (E→A)c) Authentication followed by encryption (A→E)d) Independently encrypt and authenticate (E +
How many passes through the plaintext does the CCM require to generate the MAC value?
Which of the following terms is not an input to the CCM encryption?
Hashing followed by encryption (H‚ÜíE) is used by which algorithm?$
Which Authentication Encryption approach is taken by the IPSec protocol?
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply