Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
Which is not true for Key-Wrapping?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
456
When the length of the IV is not 96, then
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
426
In GCM, we define S as S = GHASH(A||0^v||C||0^u||[len(A)]||[len(C)]). What is v defined as?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
435
How many passes through the plaintext does the CCM require to generate the MAC value?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
457
Which of the following terms is not an input to the CCM encryption?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
1
1
435
Hashing followed by encryption (H→E) is used by which algorithm?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
824
Which Authentication Encryption approach is taken by the SSH protocol?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
455
Which Authentication Encryption approach is taken by the IPSec protocol?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
407
Which Authentication Encryption approach is taken by the SSL/TLS protocol?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
479
In CMAC, which scenario is a different key K2 is used instead of K1?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
488
Which cryptographic algorithm is used in CMAC?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
573
What is the value of opad in the HMAC structure?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
521
What is the value of ipad in the HMAC structure?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
543
Total:
11022
Previous
577
578
579
580
581
Next
Go