Explore topic-wise MCQs in Cryptography and Network Security.

This section includes 9 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

What is the value of opad in the HMAC structure?

A. 00111110
B. 00110010
C. 10110110
D. 01011100
Answer» E.
2.

K2 is derived by left shifting L by 2 bits. What is L defined as?

A. E(K , 0<sup>b</sup>)
B. E(K , 10*<sup>b</sup>)
C. E(K , 1<sup>b</sup>)
D. E(K , 10*1<sup>b</sup>)
Answer» B. E(K , 10*<sup>b</sup>)
3.

In CMAC, which scenario is a different key K2 is used instead of K1?

A. If the tag is larger than the key length
B. If the tag is shorter than the key length
C. In the last step of the algorithm
D. If the plaintext/message is not an integer multiple of the cipher clock length
Answer» E.
4.

Which cryptographic algorithm is used in CMAC?

A. Triple DES and AES
B. DES
C. RC-4
D. AES
Answer» B. DES
5.

What is the full-form of CMAC?

A. Code-based MAC
B. Cipher-based MAC
C. Construct-based MAC
D. Collective-based MAC
Answer» C. Construct-based MAC
6.

Which mode of operation is used in the DAA?

A. output feedback mode
B. electronic code block mode
C. cipher block chaining mode
D. cipher feedback mode
Answer» D. cipher feedback mode
7.

Data Authentication Algorithm (DAA) is based on

A. DES
B. AES
C. MD-5
D. SHA-1
Answer» B. AES
8.

What is the value of ipad in the HMAC structure?

A. 00111110
B. 00110010
C. 10110110
D. 01110110
Answer» C. 10110110
9.

Cryptographic hash functions execute faster in software than block ciphers.

A. Statement is correct
B. Statement is incorrect
C. Depends on the hash function
D. Depends on the processor
Answer» E.