###### Computer-Networks

September 12, 2024###### IP-Address

September 12, 2024# Computer-Networks

Question 77 |

Consider the following two statements:

(i) A hash function (these are often used for computing digital signatures) is an injective function.

(ii) An encryption technique such as DES performs a permutation on the elements of its input alphabet.

Which one of the following options is valid for the above two statements?

Both are false | |

Statement (i) is true and the other is false | |

Statement (ii) is true and the other is false | |

Both are true |

Question 77 Explanation:

i) Hash function is many to one function. It is not one-one (or) injective.

ii) It uses the P-Box permutation.

Statement-I is false, II is true.

ii) It uses the P-Box permutation.

Statement-I is false, II is true.

Correct Answer: C

Question 77 Explanation:

i) Hash function is many to one function. It is not one-one (or) injective.

ii) It uses the P-Box permutation.

Statement-I is false, II is true.

ii) It uses the P-Box permutation.

Statement-I is false, II is true.

Subscribe

Login

0 Comments