Explore topic-wise MCQs in Data Integrity Algorithms.

This section includes 6 Mcqs, each offering curated multiple-choice questions to sharpen your Data Integrity Algorithms knowledge and support exam preparation. Choose a topic below to get started.

1.

SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations.

A. True
B. False
Answer» B. False
2.

Which step function works only W[0, 0]?

A. Theta
B. Iota
C. Pi
D. Chi
Answer» C. Pi
3.

How many iterations / rounds does the Keccak function have ?

A. 12
B. 36
C. 16
D. 24
Answer» E.
4.

In SHA-3, for a message digest size of 256, what is the bitrate r (capacity = 512) ?

A. 576
B. 1088
C. 1152
D. 832
Answer» C. 1152
5.

In SHA-3, which function does the operation L[2,3]<- C[1] XOR L[2,3] XOR ROT(C[3],1) represent?

A. Theta
B. Rho
C. Pi
D. Chi
Answer» B. Rho
6.

In SHA-3, which step function does the operation L[2,3] <- L[2,3] XOR NOT(L[3,3]) AND L[4,3] represent?

A. Theta
B. Rho
C. Pi
D. Chi
Answer» E.