Data Integrity Algorithms Questions and Answers – CCM, GCM and Key Wrapping – I

This set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “CCM, GCM and Key Wrapping”.

1. Which Authentication Encryption approach is taken by the SSL/TLS protocol?
a) Hashing followed by encryption (H→E)
b) Encryption followed by authentication (E→A)
c) Authentication followed by encryption (A→E)
d) Independently encrypt and authenticate (E + A)
View Answer

Answer: c
Explanation: Authentication followed by encryption (A→E) is the AE approach taken by the SSL/TLS protocol.

2. Which Authentication Encryption approach is taken by the IPSec protocol?
a) Authentication followed by encryption (A→E)
b) Hashing followed by encryption (H→E)
c) Encryption followed by authentication (E→A)
d) Independently encrypt and authenticate (E + A)
View Answer

Answer: c
Explanation: Encryption followed by authentication (E→A) is the AE approach taken by the IPSec protocol.

3. Which Authentication Encryption approach is taken by the SSH protocol?
a) Hashing followed by encryption (H→E)
b) Encryption followed by authentication (E→A)
c) Authentication followed by encryption (A→E)
d) Independently encrypt and authenticate (E + A)
View Answer

Answer: d
Explanation: Independently encrypt and authenticate (E + A)is the AE approach taken by the SSH protocol.
advertisement
advertisement

4. Hashing followed by encryption (H→E) is used by which algorithm?
a) IPSec
b) SSH
c) WEP
d) SSL/TLS
View Answer

Answer: c
Explanation: WEP uses Hashing followed by encryption (H→E) algorithm.

5. Which of the following terms is not an input to the CCM encryption?
a) Nonce.
b) Associated data.
c) Plaintext message.
d) Tag.
View Answer

Answer: d
Explanation: A tag is not involved with CCM.
Note: Join free Sanfoundry classes at Telegram or Youtube

6. How many passes through the plaintext does the CCM require to generate the MAC value?
a) 2
b) 3
c) 4
d) 5
View Answer

Answer: a
Explanation: The CCM requires 2 passes through the plaintext to generate the MAC value.

7. What does the following figure represent?
The figure is the hash producing function of the Galois Counter MAC

advertisement

a) GCM (Galois Counter MAC)
b) GCTR ( part of GCM)
c) GHASH ( hash algorithm of GCM)
d) None of the mentioned
View Answer

Answer: c
Explanation: The figure is the hash producing function of the Galois Counter MAC.

8. In GCM, we define S as S = GHASH(A||0v||C||0u||[len(A)]||[len(C)]). What is u defined as?
a) 64 ceil[len(A)/128] – len(A)
b) 64 ceil[len(C)/128] – len(C)
c) 128 ceil[len(A)/128] – len(A)
d) 128 ceil[len(C)/128] – len(C)
View Answer

Answer: d
Explanation: u = 128 ceil[len(C)/128] – len(C).
advertisement

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.