Question
a.
64 ceil[len (A)/128] – len (A)
b.
64 ceil[len (C)/128] – len (C)
c.
128 ceil[len (A)/128] – len (A)
d.
128 ceil[len (C)/128] – len (C)
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. In GCM, we define S as S = GHASH(A||0^v||C||0^u||[len(A)]||[len(C)]). What is v defined as?
Similar Questions
Discover Related MCQs
Q. When the length of the IV is not 96, then
View solution
Q. Which is not true for Key-Wrapping?
View solution
Q. What is the value of A (0)?
View solution
Q. The key Wrapping Algorithm provides confidentiality and data integrity.
View solution
Q. Which of the following is not true for whirlpool hashing function?
View solution
Q. The expected workload of generating a collision is of the order of ____________ executions of Whirlpool.
View solution
Q. Given a message, the expected workload of finding a message that hashes to that value is of the order ____________
View solution
Q. Given a message and its n-bit hash result, the expected workload of finding a message that hashes to the same value is of the order _______________
View solution
Q. The message is padded to
View solution
Q. The length of the message is appended to the message. What is the size of this length?
View solution
Q. The hash matrix is of the size
View solution
Q. The 8 × 8 hash matrix holds values of size
View solution
Q. The hash matrix of 8 × 8 is preferred over a 16 × 4 matrix because
View solution
Q. How many rounds are there in one Whirlpool Iteration?
View solution
Q. Which one of these is not a Whirlpool function?
View solution
Q. What is the correct order of operation within each round of the Whirlpool algorithm?
View solution
Q. What is the size of the s-box table/matrix in Whirlpool?
View solution
Q. The S-box implements linear mapping thus providing diffusion.
View solution
Q. Another name for the Whirlpool key is
View solution
Q. How many round constants (RCs) are required in Whirlpool?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!
Software Engineering
Learn about the systematic approach to developing software with our Software...
Cyber Security
Understand the fundamentals of safeguarding digital assets with our Cyber Security...