1. The registers ‘a’ and ‘e’ involve

a) Permutation and substitution both

b) Only Permutation

c) Only substitution

d) Don’t undergo any operations

### View Answer

2. In SHA-512, W16 is dependent on

a) W0,W3,W7,W13

b) W3,W7,W11,W15

c) W0,W1,W9,W14

d) W0,W1,W10,W13

### View Answer

3. In SHA-512, W16 is dependent on

a) W63,W68,W72,W76

b) W66,W70,W71,W76

c) W63,W67,W71,W77

d) W63,W65,W71,W76

### View Answer

4. What is the number of operation required to come up with 2 messages having the same message digest in SHA-512?

a) 2^{256}

b) 2^{512}

c) 2^{1024}

d) 2^{128}

### View Answer

^{256}.

5. The underlying structure of the SHA-3 algorithm is referred to as

a) Texture construction

b) Layer construction

c) Sponge construction

d) Cement construction

### View Answer

6. SHA-3 allows variable length input and output.

a) True

b) False

### View Answer

7. Multi-rate padding is denoted by

a) 10*

b) 10*1

c) 10*1*

d) 0*1

### View Answer

8. In SHA-3, if the desired output is l bits, then j blocks are produced, such that

a) (j-1) x r < l <= (j) x r

b) (j) x r< l <= (j+1) x r

c) (j-1) x r < l <= (j+1) x r

d) (j+1) x r < l <= (j+2) x r

### View Answer

9. In the sponge construction, the value ‘c’ is known as

a) constant

b) capacity

c) construct

d) closure

### View Answer

10. The larger the value of ‘r’, the lesser the rate at which message bits are processed by the sponge construction.

a) True

b) False

### View Answer

11. We can trade security for speed by

a) decreasing ‘c’ and increasing ‘r’

b) increasing ‘c’ and decreasing ‘r’

c) decreasing both ‘c’ and ‘r’

d) increasing both ‘c’ and ‘r’

### View Answer

12. The default values for Keccak f are

a) c =1024 and r =576

b) c =786 and r =832

c) c =512 and r =1088

d) c =512 and r =832