Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
Which is not true for Key-Wrapping?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
416
When the length of the IV is not 96, then
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
385
In GCM, we define S as S = GHASH(A||0^v||C||0^u||[len(A)]||[len(C)]). What is v defined as?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
401
How many passes through the plaintext does the CCM require to generate the MAC value?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
416
Which of the following terms is not an input to the CCM encryption?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
1
1
394
Hashing followed by encryption (H→E) is used by which algorithm?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
652
Which Authentication Encryption approach is taken by the SSH protocol?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
402
Which Authentication Encryption approach is taken by the IPSec protocol?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
366
Which Authentication Encryption approach is taken by the SSL/TLS protocol?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
438
In CMAC, which scenario is a different key K2 is used instead of K1?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
439
Which cryptographic algorithm is used in CMAC?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
517
What is the value of opad in the HMAC structure?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
481
What is the value of ipad in the HMAC structure?
Networks
2022-06-02
Answers
30
Question
40
Followers
30
0
1
472
Total:
11022
Previous
577
578
579
580
581
Next
Go