adplus-dvertising
frame-decoration

Question

Sometimes a simple tag is introduced along with the session key. This tag has 8 bits. Which of the following options is wrong?

a.

One bit indicates whether the key is a session key or a master key

b.

One bit indicates whether the key can be used for encryption

c.

Three bit indicates whether the key can be used for decryption

d.

Remaining bits are for future use

Answer: (c).Three bit indicates whether the key can be used for decryption

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Sometimes a simple tag is introduced along with the session key. This tag has 8 bits. Which of the following options is wrong?

Similar Questions

Discover Related MCQs

Q. Hash Value = H = h(CV)
Key Input = Km XOR H
Ciphertext = E([Km XOR H],Ks)
What is CV here?

Q. Which is the correct representation for session key recovery for the plain text?

Q. Which of the following is required to find the session key?

i) Control Vector
ii) Master Key
iii) Encrypted session Key

Q. “Meet in the middle attack” and “man in the middle attack” are the same.

Q. “Meet in the middle attack” is an attack

Q. Public key encryption/decryption is not preferred because

Q. Which one of the following is not a public key distribution means?

Q. What is the PGP stand for?

Q. PGP makes use of which cryptographic algorithm?

Q. USENET is related to which of the following Public Key distribution schemes?

Q. Which of the following public key distribution systems is most secure?

Q. Which systems use a timestamp?

i) Public-Key Certificates
ii) Public announcements
iii) Publicly available directories
iv) Public-Key authority

Q. Which of these systems use timestamps as an expiration date?

Q. Which system uses a trusted third party interface?

Q. Publicly Available directory is more secure than which other system?

Q. Extensions were added in which version?

Q. The subject unique identifier of the X.509 certificates was added in which version?

Q. Which of the following is not an element/field of the X.509 certificates?

Q. Suppose that A has obtained a certificate from certification authority X1 and B has obtained certificate authority from CA X2. A can use a chain of certificates to obtain B’s public key. In notation of X.509, this chain is represented in the correct order as –

Q. Certificates generated by X that are the certificates of other CAs are Reverse Certificates.