MCQOPTIONS
Saved Bookmarks
This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 2. |
Which step function works only W[0, 0]? |
| A. | Theta |
| B. | Iota |
| C. | Pi |
| D. | Chi |
| Answer» C. Pi | |
| 3. |
How many iterations / rounds does the Keccak function have ? |
| A. | 12 |
| B. | 36 |
| C. | 16 |
| D. | 24 |
| Answer» E. | |
| 4. |
In SHA-3, for a message digest size of 256, what is the bitrate ‘r’ (capacity = 512) ? |
| A. | 576 |
| B. | 1088 |
| C. | 1152 |
| D. | 832 |
| Answer» C. 1152 | |
| 5. |
In SHA-3, which function does the operation L[2,3] |
| A. | Theta |
| B. | Rho |
| C. | Pi |
| D. | Chi |
| Answer» B. Rho | |
| 6. |
In SHA-3, which step function does the operation L[2,3] |
| A. | Theta |
| B. | Rho |
| C. | Pi |
| D. | Chi |
| Answer» E. | |
| 7. |
HOW_MANY_ITERATIONS_/_ROUNDS_DOES_THE_KECCAK_FUNCTION_HAVE_??$ |
| A. | 12 |
| B. | 36 |
| C. | 16 |
| D. | 24 |
| Answer» E. | |
| 8. |
SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations.$ |
| A. | True |
| B. | False |
| Answer» B. False | |
| 9. |
Which step function works only W[0, 0]?$ |
| A. | Theta |
| B. | Iota |
| C. | Pi |
| D. | Chi |
| Answer» C. Pi | |
| 10. |
What are the co-ordinates of the bottom-right most lane? |
| A. | L[4 ,4]. |
| B. | L[4, 0]. |
| C. | L[5, 5]. |
| D. | L[5, 1]. |
| Answer» C. L[5, 5]. | |
| 11. |
Within the Keccak function-f, the 1600 bits are arranged into a 5 x 5 x 64 array a. The 64-bit units are referred to as |
| A. | lemma |
| B. | z co-ordinate |
| C. | kernel |
| D. | lanes |
| Answer» E. | |
| 12. |
The sponge construction involves 2 phases, these are |
| A. | absorbing and adaptive |
| B. | adaptive and squeezing |
| C. | absorbing and squeezing |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 13. |
In SHA-3, for a message digest size of 256, what is the bitrate ‘r’ (capacity = 512) ?$ |
| A. | 576 |
| B. | 1088 |
| C. | 1152 |
| D. | 832 |
| Answer» C. 1152 | |
| 14. |
Which among the following is not a substitution operation? |
| A. | Theta |
| B. | Iota |
| C. | Pi |
| D. | Chi |
| Answer» D. Chi | |
| 15. |
In SHA-3, which step function does not affect W [0, 0]? |
| A. | Theta |
| B. | Iota |
| C. | Pi |
| D. | Chi |
| Answer» D. Chi | |
| 16. |
How many rounds are present in each iteration function of SHA-3? |
| A. | 3 |
| B. | 4 |
| C. | 5 |
| D. | 6 |
| Answer» D. 6 | |
| 17. |
In SHA-3, which function does the operation L[2,3] |
| A. | Theta |
| B. | Rho |
| C. | Pi |
| D. | Chi |
| Answer» B. Rho | |
| 18. |
In SHA-3, which step function does the operation L[2,3] |
| A. | Theta |
| B. | Rho |
| C. | Pi |
| D. | Chi |
| Answer» E. | |