adplus-dvertising
frame-decoration

Question

The value of the golden ratio is

a.

ᶲ =2.618

b.

ᶲ =1.622

c.

ᶲ =1.743

d.

ᶲ =1.618

Answer: (d).ᶲ =1.618

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. The value of the golden ratio is

Similar Questions

Discover Related MCQs

Q. The value of the base of natural logarithms is

Q. RC5 uses 2 magic constants to define their subkeys. These are

Q. The total number of subkeys t used in the RC5 algorithm is given by the formula (r corresponds to number of rounds)

Q. The standard/nominal version of the RC5-w/r/b has parameters w/r/b as

Q. The number of rounds in RC5 can range from 0 to _____________

Q. What are the allowable values of word size in bit for RC5 algorithm?

Q. Which of the following is true for the RC5 algorithm?

i) Has variable number of rounds
ii) Has fixed Key length
iii) High memory Requirements
iv) Uses only primitive computational operations commonly found on microprocessors

Q. Which of the following statements are true with respect to the blowfish algorithm –

i) Provided key is large enough, brute-force key search is not practical, especially given the high key schedule cost
ii) Key dependent S-boxes and sub keys make analysis very difficult
iii) Changing both halves in each round increases security
iv) Blowfish has improved avalanche effects

Q. The 32bit output of s-box 1 is XORed with s-box 2.

Q. A single blowfish s-box converts 8-bits to _________ bits.

Q. What is the number of iterations required in total to generate all the sub-keys in blowfish?

Q. P15 gets XORed with

Q. P17 gets XORed with

Q. To generate the sub-key P1 to P18 we use the hexadecimal equivalent digits of ____________

Q. In blowfish, the keys are stored in the form of an array ranging from K1, K2 to Ki. What is the value of i?

Q. How many entries are present in each of the S-boxes present in the blowfish algorithm?

Q. How many S-boxes are present in the blowfish algorithm?

Q. XOR and addition operations take place on bytes of size

Q. Blowfish algorithm uses the Feistel Structure.

Q. The blowfish algorithm’s key expansion converts a key of at most 448 bits into several subkey arrays totaling ___________ bytes.