MCQOPTIONS
Bookmark
Saved Bookmarks
→
Cryptography and Network Security
→
Hmac Daa Cmac
→
i) ii) and iv)..
1.
i) ii) and iv)
A.
ii) and iii)
B.
i)
C.
All are true
Answer» C. All are true
Show Answer
Discussion
No Comment Found
Post Comment
Related MCQs
The last two blocks of the XTS-AES mode are
Which of the following statements are true with respect to the blowfish algorithm?i) Provided key is large enough, brute-force key search is not practical, especially given the high key schedule costii) Key dependent S-boxes and sub keys make analysis very difficultiii) Changing both halves in each round increases securityiv) Blowfish has improved avalanche effects
The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes.
Which of the following statements are true.i) In the CBC mode, the plaintext block is XORed with previous ciphertext block before encryption.ii) The CTR mode does not require an Initialization Vectoriii) The last block in the CBC mode uses an Initialization Vectoriv) In CBC mode repetitions in plaintext do not show up in ciphertext
A total of seven messages are required in the Public-Key distribution scenario. However, the initial five messages need to be used only infrequently because both A and B can save the other’s public key for future – a technique known as ____________
Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, the correct order of this chain is represented as –
It is desirable to revoke a certificate before it expires because –
The multiplicative Inverse of 550 mod 1769 is –
III)?$
The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___ bytes.$#
Reply to Comment
×
Name
*
Email
*
Comment
*
Submit Reply