COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following cryptographic algorithms is MOST often used with IPSec?
A
Blowfish
B
Twofish
C
RC4
D
HMAC
Explanation: 

Detailed explanation-1: -Hashed Message Authentication Codes (HMAC) The fundamental hash algorithms used by IPSec are the cryptographically secure Message Digest 5 (MD5) and Secure Hash Algorithm 1 (SHA-1) hash functions.

Detailed explanation-2: -IPsec uses two types of algorithms, authentication and encryption. The authentication algorithms and the DES encryption algorithms are part of core Solaris installation.

Detailed explanation-3: -IPSec Transforms The AH protocol with the HMAC with MD5 authentication algorithm in tunnel mode is used for authentication.

Detailed explanation-4: -The fundamental hash algorithms used by IPSec are the cryptographically secure MD5 and SHA-1 hash functions.

There is 1 question to complete.