MCQOPTIONS
Saved Bookmarks
This section includes 6 Mcqs, each offering curated multiple-choice questions to sharpen your Data Integrity Algorithms knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 2. |
Which step function works only W[0, 0]? |
| A. | Theta |
| B. | Iota |
| C. | Pi |
| D. | Chi |
| Answer» C. Pi | |
| 3. |
How many iterations / rounds does the Keccak function have ? |
| A. | 12 |
| B. | 36 |
| C. | 16 |
| D. | 24 |
| Answer» E. | |
| 4. |
In SHA-3, for a message digest size of 256, what is the bitrate r (capacity = 512) ? |
| A. | 576 |
| B. | 1088 |
| C. | 1152 |
| D. | 832 |
| Answer» C. 1152 | |
| 5. |
In SHA-3, which function does the operation L[2,3]<- C[1] XOR L[2,3] XOR ROT(C[3],1) represent? |
| A. | Theta |
| B. | Rho |
| C. | Pi |
| D. | Chi |
| Answer» B. Rho | |
| 6. |
In SHA-3, which step function does the operation L[2,3] <- L[2,3] XOR NOT(L[3,3]) AND L[4,3] represent? |
| A. | Theta |
| B. | Rho |
| C. | Pi |
| D. | Chi |
| Answer» E. | |