Network Defense Essentials (NDE) 2026 – 400 Free Practice Questions to Pass the Exam

Question: 1 / 545

Which hashing algorithm utilizes sponge construction for processing?

SHA-2

SHA-3

The hashing algorithm that utilizes sponge construction for processing is SHA-3.

SHA-3 is based on the Keccak algorithm, which employs a unique structure called a sponge construction. This approach allows for flexible input and output lengths and enhances security by enabling the algorithm to absorb data into a fixed-size sponge state before squeezing out a hash of the desired length. This design offers several advantages, including resistance to length-extension attacks, making SHA-3 suitable for a variety of cryptographic applications.

In contrast, SHA-2, MD5, and RIPEMD do not use sponge construction. SHA-2 is based on a Merkle-Damgård structure and is an iterative hash function, while MD5 and RIPEMD also follow similar traditional hash function designs that lack the flexibility and security features afforded by sponge construction. Hence, SHA-3 stands out as the only algorithm among the options that employs this innovative method.

Get further explanation with Examzify DeepDiveBeta

MD5

RIPEMD

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy