Intended to provide an integrity check as part of the encryption operation, encryption in Kerberos Version 4 makes use of a nonstandard mode of DES known as ____________. It has been demonstrated that this mode is vulnerable to an attack involving the interchange of ciphertext blocks.

Fill in the blank(s) with the appropriate word(s).


propagating cipher block chaining (PCBC)

Computer Science & Information Technology

You might also like to view...

Which important networking troubleshooting tool is part of ICMP, and how does it test a network connection?

What will be an ideal response?

Computer Science & Information Technology

The Clipboard pane is opened by ________

A) right-clicking the Paste button and selecting Open from the shortcut menu B) clicking the Clipboard Pane Launcher C) right-clicking the Format Painter button and selecting Open from the shortcut menu D) clicking the Paste button

Computer Science & Information Technology

The ________ is a dialog box that can be used to manage styles in documents

Fill in the blank(s) with correct word

Computer Science & Information Technology

If a technician wanted to create a copy of the group policy configuration for a particular domain computer, which command could be used?

A) MSDIAG B) MSCTC C) GPRESULT D) REGSERV

Computer Science & Information Technology