adplus-dvertising
frame-decoration

Question

MAC is a

a.

one-to-one mapping

b.

many-to-one mapping

c.

onto mapping

d.

none of the mentioned

Answer: (b).many-to-one mapping

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. MAC is a

Similar Questions

Discover Related MCQs

Q. For an n-bit tag and a k-bit key, the level of effort required for brute force attack on a MAC algorithm is

Q. Cryptographic hash functions execute faster in software than block ciphers.

Q. What is the value of ipad in the HMAC structure?

Q. What is the value of opad in the HMAC structure?

Q. Which cryptographic algorithm is used in CMAC?

Q. In CMAC, which scenario is a different key K2 is used instead of K1?

Q. Which Authentication Encryption approach is taken by the SSL/TLS protocol?

Q. Which Authentication Encryption approach is taken by the IPSec protocol?

Q. Which Authentication Encryption approach is taken by the SSH protocol?

Q. Hashing followed by encryption (H→E) is used by which algorithm?

Q. Which of the following terms is not an input to the CCM encryption?

Q. How many passes through the plaintext does the CCM require to generate the MAC value?

Q. In GCM, we define S as S = GHASH(A||0^v||C||0^u||[len(A)]||[len(C)]). What is v defined as?

Q. When the length of the IV is not 96, then

Q. Which is not true for Key-Wrapping?

Q. What is the value of A (0)?

Q. The key Wrapping Algorithm provides confidentiality and data integrity.

Q. Which of the following is not true for whirlpool hashing function?

Q. The expected workload of generating a collision is of the order of ____________ executions of Whirlpool.

Q. Given a message, the expected workload of finding a message that hashes to that value is of the order ____________