MCQOPTIONS
Saved Bookmarks
This section includes 5 Mcqs, each offering curated multiple-choice questions to sharpen your Data Integrity Algorithms knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
We can trade security for speed by |
| A. | decreasing c and increasing r |
| B. | increasing c and decreasing r |
| C. | decreasing both c and r |
| D. | increasing both c and r |
| Answer» C. decreasing both c and r | |
| 2. |
The larger the value of r , the lesser the rate at which message bits are processed by the sponge construction. |
| A. | True |
| B. | False |
| Answer» C. | |
| 3. |
In the sponge construction, the value c is known as |
| A. | constant |
| B. | capacity |
| C. | construct |
| D. | closure |
| Answer» C. construct | |
| 4. |
In SHA-3, if the desired output is l bits, then j blocks are produced, such that |
| A. | (j-1) x r < l <= (j) x r |
| B. | (j) x r< l <= (j+1) x r |
| C. | (j-1) x r < l <= (j+1) x r |
| D. | (j+1) x r < l <= (j+2) x r |
| Answer» B. (j) x r< l <= (j+1) x r | |
| 5. |
The registers a and e involve |
| A. | Permutation and substitution both |
| B. | Only Permutation |
| C. | Only substitution |
| D. | Don t undergo any operations |
| Answer» D. Don t undergo any operations | |