Data Integrity Algorithms Questions and Answers – HMAC, DAA and CMAC

«
»

This set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “HMAC, DAA and CMAC”.

1. Cryptographic hash functions execute faster in software than block ciphers.
a) Statement is correct
b) Statement is incorrect
c) Depends on the hash function
d) Depends on the processor
View Answer

Answer: d
Explanation: The execution time varies from processor to processor for different cryptographic systems.
advertisement

2. What is the value of ipad in the HMAC structure?
a) 00111110
b) 00110010
c) 10110110
d) 01110110
View Answer

Answer: b
Explanation: ipad is 36 in hexadecimal.

3. What is the value of opad in the HMAC structure?
a) 00111110
b) 00110010
c) 10110110
d) 01011100
View Answer

Answer: d
Explanation: opad is 5C in hexadecimal.

4. Data Authentication Algorithm (DAA) is based on
a) DES
b) AES
c) MD-5
d) SHA-1
View Answer

Answer: a
Explanation: The DAA is an algorithm based on the DES cipher block chaining mode.
advertisement

5. Which mode of operation is used in the DAA?
a) output feedback mode
b) electronic code block mode
c) cipher block chaining mode
d) cipher feedback mode
View Answer

Answer: c
Explanation: The DAA is an algorithm based on the DES cipher block chaining mode.

6. What is the full-form of CMAC?
a) Code-based MAC
b) Cipher-based MAC
c) Construct-based MAC
d) Collective-based MAC
View Answer

Answer: b
Explanation: CMAC stands for cipher-based message authentication code.

7. Which cryptographic algorithm is used in CMAC?
a) Triple DES and AES
b) DES
c) RC-4
d) AES
View Answer

Answer: a
Explanation: The CMAC algorithm uses triple DES and AES.
advertisement

8. In CMAC, which scenario is a different key K2 is used instead of K1?
a) If the tag is larger than the key length
b) If the tag is shorter than the key length
c) In the last step of the algorithm
d) If the plaintext/message is not an integer multiple of the cipher clock length
View Answer

Answer: d
Explanation: If the plaintext/message is not an integer multiple of the cipher clock length, then K2 is used.

9. K2 is derived by left shifting L by 2 bits. What is L defined as?
a) E(K , 0b)
b) E(K , 10*b)
c) E(K , 1b)
d) E(K , 10*1b)
View Answer

Answer: a
Explanation: L is defined as encrypting b-bits of 0s with the key K through the same algorithm.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

advertisement

To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

advertisement
advertisement
advertisement
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn