اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 327 من 329

كل الأسئلة

Harper designs an email application and chooses a symmetric block cipher with a 64-bit block size and a 12- or 16-round Feistel network. It uses large 8×32-bit S-boxes, modular addition/subtraction, key-dependent rotation, XOR operations, and keys such as masking key (Km1) and rotation key (Kr1). Which algorithm is being used?

الخيارات

  • A ‎CAST-128‎
  • B AES
  • C GOST block cipher
  • D DES

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.