

MCQOPTIONS
Saved Bookmarks
This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations. |
A. | True |
B. | False |
Answer» B. False | |
2. |
Which step function works only W[0, 0]? |
A. | Theta |
B. | Iota |
C. | Pi |
D. | Chi |
Answer» C. Pi | |
3. |
How many iterations / rounds does the Keccak function have ? |
A. | 12 |
B. | 36 |
C. | 16 |
D. | 24 |
Answer» E. | |
4. |
In SHA-3, for a message digest size of 256, what is the bitrate ‘r’ (capacity = 512) ? |
A. | 576 |
B. | 1088 |
C. | 1152 |
D. | 832 |
Answer» C. 1152 | |
5. |
In SHA-3, which function does the operation L[2,3]<- C[1] XOR L[2,3] XOR ROT(C[3],1) represent? |
A. | Theta |
B. | Rho |
C. | Pi |
D. | Chi |
Answer» B. Rho | |
6. |
In SHA-3, which step function does the operation L[2,3] <- L[2,3] XOR NOT(L[3,3]) AND L[4,3] represent? |
A. | Theta |
B. | Rho |
C. | Pi |
D. | Chi |
Answer» E. | |
7. |
HOW_MANY_ITERATIONS_/_ROUNDS_DOES_THE_KECCAK_FUNCTION_HAVE_??$ |
A. | 12 |
B. | 36 |
C. | 16 |
D. | 24 |
Answer» E. | |
8. |
SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations.$ |
A. | True |
B. | False |
Answer» B. False | |
9. |
Which step function works only W[0, 0]?$ |
A. | Theta |
B. | Iota |
C. | Pi |
D. | Chi |
Answer» C. Pi | |
10. |
What are the co-ordinates of the bottom-right most lane? |
A. | L[4 ,4]. |
B. | L[4, 0]. |
C. | L[5, 5]. |
D. | L[5, 1]. |
Answer» C. L[5, 5]. | |
11. |
Within the Keccak function-f, the 1600 bits are arranged into a 5 x 5 x 64 array a. The 64-bit units are referred to as |
A. | lemma |
B. | z co-ordinate |
C. | kernel |
D. | lanes |
Answer» E. | |
12. |
The sponge construction involves 2 phases, these are |
A. | absorbing and adaptive |
B. | adaptive and squeezing |
C. | absorbing and squeezing |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
13. |
In SHA-3, for a message digest size of 256, what is the bitrate ‘r’ (capacity = 512) ?$ |
A. | 576 |
B. | 1088 |
C. | 1152 |
D. | 832 |
Answer» C. 1152 | |
14. |
Which among the following is not a substitution operation? |
A. | Theta |
B. | Iota |
C. | Pi |
D. | Chi |
Answer» D. Chi | |
15. |
In SHA-3, which step function does not affect W [0, 0]? |
A. | Theta |
B. | Iota |
C. | Pi |
D. | Chi |
Answer» D. Chi | |
16. |
How many rounds are present in each iteration function of SHA-3? |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 6 |
Answer» D. 6 | |
17. |
In SHA-3, which function does the operation L[2,3]<- C[1] XOR L[2,3] XOR ROT(C[3],1) represent? |
A. | Theta |
B. | Rho |
C. | Pi |
D. | Chi |
Answer» B. Rho | |
18. |
In SHA-3, which step function does the operation L[2,3] <- L[2,3] XOR NOT(L[3,3]) AND L[4,3] represent? |
A. | Theta |
B. | Rho |
C. | Pi |
D. | Chi |
Answer» E. | |