Explore topic-wise MCQs in Cryptography and Network Security.

This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

We can trade security for speed by

A. decreasing ‘c’ and increasing ‘r’
B. increasing ‘c’ and decreasing ‘r’
C. decreasing both ‘c’ and ‘r’
D. increasing both ‘c’ and ‘r’
Answer» C. decreasing both ‘c’ and ‘r’
2.

The larger the value of ‘r’, the lesser the rate at which message bits are processed by the sponge construction.

A. True
B. False
Answer» C.
3.

In the sponge construction, the value ‘c’ is known as

A. constant
B. capacity
C. construct
D. closure
Answer» C. construct
4.

In SHA-3, if the desired output is l bits, then j blocks are produced, such that

A. (j-1) x r < l <= (j) x r
B. (j) x r< l <= (j+1) x r
C. (j-1) x r < l <= (j+1) x r
D. (j+1) x r < l <= (j+2) x r
Answer» B. (j) x r< l <= (j+1) x r
5.

The registers ‘a’ and ‘e’ involve

A. Permutation and substitution both
B. Only Permutation
C. Only substitution
D. Don’t undergo any operations
Answer» D. Don’t undergo any operations
6.

IN_THE_SPONGE_CONSTRUCTION,_THE_VALUE_‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚Àւ§C‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚ÀÖ¬•_IS_KNOWN_AS?$#

A. constant
B. capacity
C. construct
D. closure
Answer» C. construct
7.

We can trade security for speed by$

A. decreasing ‘c’ and increasing ‘r’
B. increasing ‘c’ and decreasing ‘r’
C. decreasing both ‘c’ and ‘r’
D. increasing both ‘c’ and ‘r’
Answer» C. decreasing both ‚Äö√Ñ√∂‚àö√ë‚àö‚â§c‚Äö√Ñ√∂‚àö√ë‚àö¬• and ‚Äö√Ñ√∂‚àö√ë‚àö‚â§r‚Äö√Ñ√∂‚àö√ë‚àö¬•
8.

The larger the value of ‘r’, the lesser the rate at which message bits are processed by the sponge construction.$#

A. True
B. False
Answer» C.
9.

The default values for Keccak f are

A. c =1024 and r =576
B. c =786 and r =832
C. c =512 and r =1088
D. c =512 and r =832
Answer» D. c =512 and r =832
10.

In SHA-3, if the desired output is l bits, then j blocks are produced, such tha?

A. (j-1) x r < l <= (j) x r
B. (j) x r< l <= (j+1) x r
C. (j-1) x r < l <= (j+1) x r
D. (j+1) x r < l <= (j+2) x r
Answer» B. (j) x r< l <= (j+1) x r
11.

Multi-rate padding is denoted by

A. 10*
B. 10*1
C. 10*1*
D. 0*1
Answer» C. 10*1*
12.

SHA-3 allows variable length input and output.

A. True
B. False
Answer» B. False
13.

The underlying structure of the SHA-3 algorithm is referred to as

A. Texture construction
B. Layer construction
C. Sponge construction
D. Cement construction
Answer» D. Cement construction
14.

What is the number of operation required to come up with 2 messages having the same message digest in SHA-512?

A. 2<sup>256</sup>
B. 2<sup>512</sup>
C. 2<sup>1024</sup>
D. 2<sup>128</sup>
Answer» B. 2<sup>512</sup>
15.

In SHA-512, W16 is dependent on

A. W0,W3,W7,W13
B. W3,W7,W11,W15
C. W0,W1,W9,W14
D. W0,W1,W10,W13
Answer» D. W0,W1,W10,W13
16.

The registers ‘a’ and ‘e’ involve

A. Permutation and substitution both
B. Only Permutation
C. Only substitution
D. Don’t undergo any operations
Answer» D. Don‚Äö√Ñ√∂‚àö√ë‚àö¬•t undergo any operations