Two MACs that are based on the use of a block cipher mode of operation are Data Authentication Algorithm and __________ .

A. GMAC
B. DMAC
C. TMAC
D. CMAC

D. CMAC

Computer Science & Information Technology

You might also like to view...

In C++, a variable that has been defined but not initialized may

a) be used in any way any identifier can be used. b) not be used at all c) not be used as an l-value d) not be used as an r-value e) have its value fetched prior to assignment.

Computer Science & Information Technology

The nodes of a LinkedListmust be stored in adjacent memory locations.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology