Question
a.
Authentication followed by encryption (A→E)
b.
Hashing followed by encryption (H→E)
c.
Encryption followed by authentication (E→A)
d.
Independently encrypt and authenticate (E + A)
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Which Authentication Encryption approach is taken by the IPSec protocol?
Similar Questions
Discover Related MCQs
Q. Which Authentication Encryption approach is taken by the SSH protocol?
View solution
Q. Hashing followed by encryption (H→E) is used by which algorithm?
View solution
Q. Which of the following terms is not an input to the CCM encryption?
View solution
Q. How many passes through the plaintext does the CCM require to generate the MAC value?
View solution
Q. In GCM, we define S as S = GHASH(A||0^v||C||0^u||[len(A)]||[len(C)]). What is v defined as?
View solution
Q. When the length of the IV is not 96, then
View solution
Q. Which is not true for Key-Wrapping?
View solution
Q. What is the value of A (0)?
View solution
Q. The key Wrapping Algorithm provides confidentiality and data integrity.
View solution
Q. Which of the following is not true for whirlpool hashing function?
View solution
Q. The expected workload of generating a collision is of the order of ____________ executions of Whirlpool.
View solution
Q. Given a message, the expected workload of finding a message that hashes to that value is of the order ____________
View solution
Q. Given a message and its n-bit hash result, the expected workload of finding a message that hashes to the same value is of the order _______________
View solution
Q. The message is padded to
View solution
Q. The length of the message is appended to the message. What is the size of this length?
View solution
Q. The hash matrix is of the size
View solution
Q. The 8 × 8 hash matrix holds values of size
View solution
Q. The hash matrix of 8 × 8 is preferred over a 16 × 4 matrix because
View solution
Q. How many rounds are there in one Whirlpool Iteration?
View solution
Q. Which one of these is not a Whirlpool function?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!