This is a computer science engineering quiz on cryptography and network security, which includes questions on Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution.
Cryptographic hash functions execute faster in software than block ciphers.
What is the value of ipad in the HMAC structure?
What is the value of opad in the HMAC structure?
What is the full-form of CMAC?
Which cryptographic algorithm is used in CMAC?
In CMAC, which scenario is a different key K2 is used instead of K1?
Extensions were added in which version?
Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in the correct order as –
Certificates generated by X that are the certificates of other CAs are Reverse Certificates.
Which of the following is not an element/field of the X.509 certificates?
Which mode of operation is used in the DAA?
Output feedback mode
Electronic code block mode
Cipher block chaining mode
Cipher feedback mode
It is desirable to revoke a certificate before it expires because?
The user is no longer certified by this CA
The CA’s certificate is assumed to be compromised
The user’s private key is assumed to be compromised
All of the mentioned
CRL stands for?
Cipher Reusable List
Certificate Revocation Language
Certificate Revocation List
Certificate Resolution Language
Data Authentication Algorithm (DAA) is based on:
DES
AES
MD-5
SHA-1
K2 is derived by left shifting L by 2 bits. What is L defined as?
E(K , 0 b)
E(K , 10*b)
E(K , 1b)
E(K , 10*1b)