Computer-Networks
September 12, 2024IP-Address
September 12, 2024Computer-Networks
Question 77 |
Consider the following two statements:
(i) A hash function (these are often used for computing digital signatures) is an injective function.
(ii) An encryption technique such as DES performs a permutation on the elements of its input alphabet.
Which one of the following options is valid for the above two statements?
Both are false | |
Statement (i) is true and the other is false | |
Statement (ii) is true and the other is false | |
Both are true |
Question 77 Explanation:
i) Hash function is many to one function. It is not one-one (or) injective.
ii) It uses the P-Box permutation.
Statement-I is false, II is true.
ii) It uses the P-Box permutation.
Statement-I is false, II is true.
Correct Answer: C
Question 77 Explanation:
i) Hash function is many to one function. It is not one-one (or) injective.
ii) It uses the P-Box permutation.
Statement-I is false, II is true.
ii) It uses the P-Box permutation.
Statement-I is false, II is true.
Subscribe
Login
0 Comments