Question
a.
NANDed, XORed
b.
Concatenated, XORed
c.
XORed, NANDed
d.
XORed, Concatenated
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. The difference between HMAC algorithm and SSLv3 is that pad1 and pad2 are ________ in SSLv3 whereas ________ in HMAC.
Similar Questions
Discover Related MCQs
Q. The full form of SSL is
View solution
Q. After the encryption stage in SSL, the maximum length of each fragment is
View solution
Q. Consider the following example –
Size of Plaintext – 48 bytes.
Size of MAC – 20 bytes.
Block Length – 8 bytes.
How many bytes of padding need to be added to the system?
View solution
Q. Which protocol is used to convey SSL related alerts to the peer entity?
View solution
Q. Which protocol consists of only 1 bit?
View solution
Q. Which protocol is used for the purpose of copying the pending state into the current state?
View solution
Q. Which of the following are possible sizes of MACs?
i) 12 Bytes
ii) 16 Bytes
iii) 20 Bytes
iv) 24 Bytes
View solution
Q. In the alert protocol the first byte takes the value 1 or 2 which corresponds to _________ and _________ respectively.
View solution
Q. Number of phases in the handshaking protocol?
View solution
Q. In the SSL record protocol operation pad_2 is –
View solution
Q. In the SSL record protocol operation pad_1 is –
View solution
Q. In the Handshake protocol action, which is the last step of the Phase 2 : Server Authentication and Key Exchange?
View solution
Q. Which is the key exchange algorithm used in CipherSuite parameter?
View solution
Q. he certificate message is required for any agreed-on key exchange method except _______________
View solution
Q. In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
View solution
Q. The DSS signature uses which hash algorithm?
View solution
Q. The RSA signature uses which hash algorithm?
View solution
Q. What is the size of the RSA signature hash after the MD5 and SHA-1 processing?
View solution
Q. The certificate_request massage includes two parameters, one of which is-
View solution
Q. The client_key_exchange message uses a pre master key of size –
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!
Software Engineering
Learn about the systematic approach to developing software with our Software...
Java Programming
Level up your coding skills with our Java Programming MCQs. From object-oriented...