

MCQOPTIONS
Saved Bookmarks
This section includes 16 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
We can trade security for speed by |
A. | decreasing ‘c’ and increasing ‘r’ |
B. | increasing ‘c’ and decreasing ‘r’ |
C. | decreasing both ‘c’ and ‘r’ |
D. | increasing both ‘c’ and ‘r’ |
Answer» C. decreasing both ‘c’ and ‘r’ | |
2. |
The larger the value of ‘r’, the lesser the rate at which message bits are processed by the sponge construction. |
A. | True |
B. | False |
Answer» C. | |
3. |
In the sponge construction, the value ‘c’ is known as |
A. | constant |
B. | capacity |
C. | construct |
D. | closure |
Answer» C. construct | |
4. |
In SHA-3, if the desired output is l bits, then j blocks are produced, such that |
A. | (j-1) x r < l <= (j) x r |
B. | (j) x r< l <= (j+1) x r |
C. | (j-1) x r < l <= (j+1) x r |
D. | (j+1) x r < l <= (j+2) x r |
Answer» B. (j) x r< l <= (j+1) x r | |
5. |
The registers ‘a’ and ‘e’ involve |
A. | Permutation and substitution both |
B. | Only Permutation |
C. | Only substitution |
D. | Don’t undergo any operations |
Answer» D. Don’t undergo any operations | |
6. |
IN_THE_SPONGE_CONSTRUCTION,_THE_VALUE_‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚Àւ§C‚ÄÖ√Ñ√∂‚ÀÖ√Ë‚ÀÖ¬•_IS_KNOWN_AS?$# |
A. | constant |
B. | capacity |
C. | construct |
D. | closure |
Answer» C. construct | |
7. |
We can trade security for speed by$ |
A. | decreasing ‘c’ and increasing ‘r’ |
B. | increasing ‘c’ and decreasing ‘r’ |
C. | decreasing both ‘c’ and ‘r’ |
D. | increasing both ‘c’ and ‘r’ |
Answer» C. decreasing both ‚Äö√Ñ√∂‚àö√ë‚àö‚â§c‚Äö√Ñ√∂‚àö√ë‚àö¬• and ‚Äö√Ñ√∂‚àö√ë‚àö‚â§r‚Äö√Ñ√∂‚àö√ë‚àö¬• | |
8. |
The larger the value of ‘r’, the lesser the rate at which message bits are processed by the sponge construction.$# |
A. | True |
B. | False |
Answer» C. | |
9. |
The default values for Keccak f are |
A. | c =1024 and r =576 |
B. | c =786 and r =832 |
C. | c =512 and r =1088 |
D. | c =512 and r =832 |
Answer» D. c =512 and r =832 | |
10. |
In SHA-3, if the desired output is l bits, then j blocks are produced, such tha? |
A. | (j-1) x r < l <= (j) x r |
B. | (j) x r< l <= (j+1) x r |
C. | (j-1) x r < l <= (j+1) x r |
D. | (j+1) x r < l <= (j+2) x r |
Answer» B. (j) x r< l <= (j+1) x r | |
11. |
Multi-rate padding is denoted by |
A. | 10* |
B. | 10*1 |
C. | 10*1* |
D. | 0*1 |
Answer» C. 10*1* | |
12. |
SHA-3 allows variable length input and output. |
A. | True |
B. | False |
Answer» B. False | |
13. |
The underlying structure of the SHA-3 algorithm is referred to as |
A. | Texture construction |
B. | Layer construction |
C. | Sponge construction |
D. | Cement construction |
Answer» D. Cement construction | |
14. |
What is the number of operation required to come up with 2 messages having the same message digest in SHA-512? |
A. | 2<sup>256</sup> |
B. | 2<sup>512</sup> |
C. | 2<sup>1024</sup> |
D. | 2<sup>128</sup> |
Answer» B. 2<sup>512</sup> | |
15. |
In SHA-512, W16 is dependent on |
A. | W0,W3,W7,W13 |
B. | W3,W7,W11,W15 |
C. | W0,W1,W9,W14 |
D. | W0,W1,W10,W13 |
Answer» D. W0,W1,W10,W13 | |
16. |
The registers ‘a’ and ‘e’ involve |
A. | Permutation and substitution both |
B. | Only Permutation |
C. | Only substitution |
D. | Don’t undergo any operations |
Answer» D. Don‚Äö√Ñ√∂‚àö√ë‚àö¬•t undergo any operations | |