Q:

Hashing followed by encryption (H→E) is used by which algorithm?

0

Hashing followed by encryption (H→E) is used by which algorithm?


  1. IPSec
  2. SSH
  3. WEP
  4. SSL/TLS

All Answers

need an explanation for this answer? contact us directly to get an explanation for this answer

 (c).WEP

need an explanation for this answer? contact us directly to get an explanation for this answer

total answers (1)

CRYPTOGRAPHY AND NETWORK SECURITY - MESSAGE AUTHENTICATION CODES AND KEY MANAGEMENT MCQ

Similar questions


need a help?


find thousands of online teachers now
Which of the following terms is not an input to th... >>
<< Which Authentication Encryption approach is taken ...