InterviewSolution
Saved Bookmarks
| 1. |
Which Authentication Encryption approach is taken by the SSH protocol?(a) Hashing followed by encryption (H→E)(b) Encryption followed by authentication (E→A)(c) Authentication followed by encryption (A→E)(d) Independently encrypt and authenticate (E + A)I had been asked this question in examination.My question is from CCM, GCM and Key Wrapping topic in division Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security |
|
Answer» The correct answer is (d) Independently encrypt and AUTHENTICATE (E + A) |
|