Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution

This is a computer science engineering quiz on cryptography and network security, which includes questions on Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution.

Start Quiz

Cryptographic hash functions execute faster in software than block ciphers.

Statement is correct Statement is incorrect Depends on the hash function Depends on the processor

What is the value of ipad in the HMAC structure?

00111110 00110010 10110110 01110110

What is the value of opad in the HMAC structure?

00111110 00110010 10110110 01011100

What is the full-form of CMAC?

Code-based MAC Cipher-based MAC Construct-based MAC Collective-based MAC

Which cryptographic algorithm is used in CMAC?

Triple DES and AES DES RC-4 AES

In CMAC, which scenario is a different key K2 is used instead of K1?

If the tag is larger than the key length If the tag is shorter than the key length In the last step of the algorithm If the plaintext/message is not an integer multiple of the cipher clock length

Extensions were added in which version?

1 2 3 4

Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in the correct order as –

X2 X1 X1 B X1 X1 X2 A X1 X2 X2 B X1 X2 X2 A

Certificates generated by X that are the certificates of other CAs are Reverse Certificates.

True False

Which of the following is not an element/field of the X.509 certificates?

Issuer Name Serial Modifier Issuer unique Identifier Signature

Which mode of operation is used in the DAA?

Output feedback mode

Electronic code block mode

Cipher block chaining mode

Cipher feedback mode

It is desirable to revoke a certificate before it expires because?

The user is no longer certified by this CA

The CA’s certificate is assumed to be compromised

The user’s private key is assumed to be compromised

All of the mentioned

CRL stands for?

Cipher Reusable List

Certificate Revocation Language

Certificate Revocation List

Certificate Resolution Language

Data Authentication Algorithm (DAA) is based on:

DES

AES

MD-5

SHA-1

K2 is derived by left shifting L by 2 bits. What is L defined as?

E(K , 0 b)

E(K , 10*b)

E(K , 1b)

E(K , 10*1b)

Quiz/Test Summary
Title: Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution
Questions: 15
Contributed by:
james