Two MACs that are based on the use of a block cipher mode of operation are Data Authentication Algorithm and __________ .

A. GMAC
B. DMAC
C. TMAC
D. CMAC


D. CMAC

Computer Science & Information Technology

You might also like to view...

Which of the following is not one of the three steps used to create a Visual Basic program?

(A) create the interface (B) set the properties of the objects (C) specify the methods (D) write the code

Computer Science & Information Technology

The following steps are used for which process relating to a sequential file?

1 . Open the file for Output 2 . Use Read statements to assign data in each record to program variables 3 . Use the EOF function to determine the end of the file 4 . Close the file a. creating a file b. reading the contents of a file c. modifying the contents of a file d. merging two files

Computer Science & Information Technology

Which of the following protocols uses stop-and-wait ARQ?

a. PPP b. SDLC c. BSC d. SLIP

Computer Science & Information Technology

What are the default object styles for any document?

What will be an ideal response?

Computer Science & Information Technology