Computer Science Engineering (CSE) Exam  >  Computer Science Engineering (CSE) Questions  >  Which two types of encryption protocols can b... Start Learning for Free
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
  • a)
    Kerberos V5
  • b)
    Certificates
  • c)
    SHA
  • d)
    MD5
Correct answer is option 'C,D'. Can you explain this answer?
Verified Answer
Which two types of encryption protocols can be used to secure the auth...
Answer: c, d
Explanation: SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.
View all questions of this test
Most Upvoted Answer
Which two types of encryption protocols can be used to secure the auth...
To secure the authentication of computers using IPsec, two types of encryption protocols that can be used are SHA (Secure Hash Algorithm) and MD5 (Message Digest Algorithm 5).

1. SHA (Secure Hash Algorithm):
- SHA is a widely used cryptographic hash function that generates a fixed-size hash value from input data.
- It provides a high level of security and is designed to be collision-resistant, meaning it is computationally infeasible to find two different inputs that produce the same hash output.
- IPsec can use SHA-1, SHA-256, or SHA-384 for hashing purposes.
- SHA-1 is the most commonly used version, but it is gradually being phased out due to security vulnerabilities.
- SHA-256 and SHA-384 offer stronger security and are recommended for use in IPsec.

2. MD5 (Message Digest Algorithm 5):
- MD5 is a widely used cryptographic hash function that takes an input (message) and produces a fixed-size 128-bit hash value.
- It is faster than SHA, but it is considered to be less secure due to its vulnerability to collision attacks.
- Collision attacks involve finding two different inputs that produce the same hash value, which could potentially allow an attacker to impersonate another entity or modify data without detection.
- As a result, MD5 is not recommended for use in security-critical applications such as IPsec.
- However, it may still be used for non-security-critical purposes where speed is a priority, such as checksumming or checksum-based integrity checks.

In the context of securing the authentication of computers using IPsec, SHA is the preferred choice for hashing purposes because of its stronger security properties. MD5, on the other hand, should be avoided due to its vulnerabilities. Therefore, the correct answer is option 'C,D' (SHA and MD5).
Explore Courses for Computer Science Engineering (CSE) exam

Top Courses for Computer Science Engineering (CSE)

Question Description
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?a)Kerberos V5b)Certificatesc)SHAd)MD5Correct answer is option 'C,D'. Can you explain this answer? for Computer Science Engineering (CSE) 2025 is part of Computer Science Engineering (CSE) preparation. The Question and answers have been prepared according to the Computer Science Engineering (CSE) exam syllabus. Information about Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?a)Kerberos V5b)Certificatesc)SHAd)MD5Correct answer is option 'C,D'. Can you explain this answer? covers all topics & solutions for Computer Science Engineering (CSE) 2025 Exam. Find important definitions, questions, meanings, examples, exercises and tests below for Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?a)Kerberos V5b)Certificatesc)SHAd)MD5Correct answer is option 'C,D'. Can you explain this answer?.
Solutions for Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?a)Kerberos V5b)Certificatesc)SHAd)MD5Correct answer is option 'C,D'. Can you explain this answer? in English & in Hindi are available as part of our courses for Computer Science Engineering (CSE). Download more important topics, notes, lectures and mock test series for Computer Science Engineering (CSE) Exam by signing up for free.
Here you can find the meaning of Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?a)Kerberos V5b)Certificatesc)SHAd)MD5Correct answer is option 'C,D'. Can you explain this answer? defined & explained in the simplest way possible. Besides giving the explanation of Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?a)Kerberos V5b)Certificatesc)SHAd)MD5Correct answer is option 'C,D'. Can you explain this answer?, a detailed solution for Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?a)Kerberos V5b)Certificatesc)SHAd)MD5Correct answer is option 'C,D'. Can you explain this answer? has been provided alongside types of Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?a)Kerberos V5b)Certificatesc)SHAd)MD5Correct answer is option 'C,D'. Can you explain this answer? theory, EduRev gives you an ample number of questions to practice Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?a)Kerberos V5b)Certificatesc)SHAd)MD5Correct answer is option 'C,D'. Can you explain this answer? tests, examples and also practice Computer Science Engineering (CSE) tests.
Explore Courses for Computer Science Engineering (CSE) exam

Top Courses for Computer Science Engineering (CSE)

Explore Courses
Signup for Free!
Signup to see your scores go up within 7 days! Learn & Practice with 1000+ FREE Notes, Videos & Tests.
10M+ students study on EduRev