Explore topic-wise MCQs in Cryptography and Network Security.

This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations.

A. True
B. False
Answer» B. False
2.

Which step function works only W[0, 0]?

A. Theta
B. Iota
C. Pi
D. Chi
Answer» C. Pi
3.

How many iterations / rounds does the Keccak function have ?

A. 12
B. 36
C. 16
D. 24
Answer» E.
4.

In SHA-3, for a message digest size of 256, what is the bitrate ‘r’ (capacity = 512) ?

A. 576
B. 1088
C. 1152
D. 832
Answer» C. 1152
5.

In SHA-3, which function does the operation L[2,3]<- C[1] XOR L[2,3] XOR ROT(C[3],1) represent?

A. Theta
B. Rho
C. Pi
D. Chi
Answer» B. Rho
6.

In SHA-3, which step function does the operation L[2,3] <- L[2,3] XOR NOT(L[3,3]) AND L[4,3] represent?

A. Theta
B. Rho
C. Pi
D. Chi
Answer» E.
7.

HOW_MANY_ITERATIONS_/_ROUNDS_DOES_THE_KECCAK_FUNCTION_HAVE_??$

A. 12
B. 36
C. 16
D. 24
Answer» E.
8.

SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations.$

A. True
B. False
Answer» B. False
9.

Which step function works only W[0, 0]?$

A. Theta
B. Iota
C. Pi
D. Chi
Answer» C. Pi
10.

What are the co-ordinates of the bottom-right most lane?

A. L[4 ,4].
B. L[4, 0].
C. L[5, 5].
D. L[5, 1].
Answer» C. L[5, 5].
11.

Within the Keccak function-f, the 1600 bits are arranged into a 5 x 5 x 64 array a. The 64-bit units are referred to as

A. lemma
B. z co-ordinate
C. kernel
D. lanes
Answer» E.
12.

The sponge construction involves 2 phases, these are

A. absorbing and adaptive
B. adaptive and squeezing
C. absorbing and squeezing
D. none of the mentioned
Answer» D. none of the mentioned
13.

In SHA-3, for a message digest size of 256, what is the bitrate ‘r’ (capacity = 512) ?$

A. 576
B. 1088
C. 1152
D. 832
Answer» C. 1152
14.

Which among the following is not a substitution operation?

A. Theta
B. Iota
C. Pi
D. Chi
Answer» D. Chi
15.

In SHA-3, which step function does not affect W [0, 0]?

A. Theta
B. Iota
C. Pi
D. Chi
Answer» D. Chi
16.

How many rounds are present in each iteration function of SHA-3?

A. 3
B. 4
C. 5
D. 6
Answer» D. 6
17.

In SHA-3, which function does the operation L[2,3]<- C[1] XOR L[2,3] XOR ROT(C[3],1) represent?

A. Theta
B. Rho
C. Pi
D. Chi
Answer» B. Rho
18.

In SHA-3, which step function does the operation L[2,3] <- L[2,3] XOR NOT(L[3,3]) AND L[4,3] represent?

A. Theta
B. Rho
C. Pi
D. Chi
Answer» E.