Search Header Logo

Message Authentication Code

Authored by Amit Mandal

Computers

University

Used 2+ times

Message Authentication Code
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

OPEN ENDED QUESTION

30 sec • Ungraded

Name

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

30 sec • Ungraded

Roll No

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

20 sec • 1 pt

Section

Evaluate responses using AI:

OFF

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

MAC can be defined as:

one-to-one mapping
many-to-one mapping
onto mapping
none of the mentioned

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

consider a n-bit tag and a k-bit key. the estimated difficulty towards performing a brute force attack on a MAC algorithm can be given as

2^k
2^n
min(2^k, 2^n)
2^k/2^n

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Message Authentication code is also known as:

testword
checkword
testbits
none of the mentioned

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A hash function guarantees the integrity of the message, it guarantees that the message has not be

replace
change
overview
violated

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?