1.

Which Authentication Encryption approach is taken by the SSH protocol?(a) Hashing followed by encryption (H→E)(b) Encryption followed by authentication (E→A)(c) Authentication followed by encryption (A→E)(d) Independently encrypt and authenticate (E + A)I had been asked this question in examination.My question is from CCM, GCM and Key Wrapping topic in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security

Answer»

The correct answer is (d) Independently encrypt and AUTHENTICATE (E + A)

To EXPLAIN: Independently encrypt and authenticate (E + A)is the AE approach TAKEN by the SSH protocol.



Discussion

No Comment Found

Related InterviewSolutions