adplus-dvertising
frame-decoration

Question

In CCMP a 128-bit AES Key is used for both integrity and confidentiality. The scheme uses a ___________ bit packet number to construct a nonce to prevent __________ attacks.

a.

48, replay

b.

64, replay

c.

48, transient

d.

64, transient

Answer: (a).48, replay

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In CCMP a 128-bit AES Key is used for both integrity and confidentiality. The scheme uses a ___________ bit packet number to construct a nonce to prevent __________ attacks.

Similar Questions

Discover Related MCQs

Q. HMAC SHA-1 produces a hash of length-

Q. In the IEEE 802.11i PRF, a nonce is generated by the following expression –

nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)

What is the value of the ‘Len’ (desirable number of pseudorandom bits)?

Q. Nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)

What is the Key ‘K’ in the above expression?

Q. What is ‘Len’ (desirable number of pseudorandom bits) field in the case of CCMP PTK computation?

Q. The message input to the IEEE 802.11 pseudorandom Function consists of 4 items concatenated together. Which of the following option is not a part of this message input –

Q. A __________ is a secret key shared by the AP and a STA and installed in some fashion outside the scope of IEEE 802.11i.

Q. The Pairwise master key (PMK) can be derived from either PSK or MSK.

Q. The pairwise transient key (PTK) is derived from –

Q. The pairwise transient key (PTK) consists of ______________ keys.

Q. Which Hashing algorithm is used to derive the PTK for PMK?

Q. Convert the following binary notation to hexadecimal notation –

10000000 00001011 00000011 00011111

Q. Generate the CRC codeword for the data word 1101011011 using generator 10011. Also write both in the polynomial form.

Q. __________ services are implemented in every 802.11 station, including AP stations. _________ services are provided between BSSs.

Q. There are a number of possible EAP exchanges that can be used during authentication phase. Typically the message flow between the STA and AP employs the _________ protocol.

Q. In the IEEE 802.11i PRF, a nonce is generated by the following expression:
nonce = PRF (Random Number, “InitCounter”, MAC || Time, Len)
What is the value of the ‘Len’ (desirable number of pseudorandom bits)?

Q. The secure authentication connection is referred to as

Q. Broadcast address is given by

Q. In the alert protocol the first byte takes the value 1 or 2 which corresponds to ________ and _________ respectively.

Q. In the SSL record protocol operation pad_1 is :

Q. An HTTP connection uses port __________ whereas HTTPS uses port __________ and invokes SSL.