Explore topic-wise MCQs in Cryptography and Network Security.

This section includes 15 Mcqs, each offering curated multiple-choice questions to sharpen your Cryptography and Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

Which one of these is not a Whirlpool function?

A. Add Key
B. Substitute Bytes
C. Mix Rows
D. Shift Rows
Answer» E.
2.

How many rounds are there in one Whirlpool Iteration?

A. 3
B. 4
C. 6
D. 8
Answer» C. 6
3.

The hash matrix of 8 × 8 is preferred over a 16 × 4 matrix because

A. it is symmetric
B. it is smaller in size
C. it is faster in computation
D. none of the mentioned
Answer» D. none of the mentioned
4.

The 8 × 8 hash matrix holds values of size

A. 16 bits
B. 32 bits
C. 8 bits
D. 4 bits
Answer» D. 4 bits
5.

THE_HASH_MATRIX_OF_8_‚ÄÖ√†√∂‚Àւ•_8_IS_PREFERRED_OVER_A_16_‚ÄÖ√†√∂‚Àւ•_4_MATRIX_BECAUSE?$#

A. it is symmetric
B. it is smaller in size
C. it is faster in computation
D. none of the mentioned
Answer» D. none of the mentioned
6.

Which one of these is not a Whirlpool function?$

A. Add Key
B. Substitute Bytes
C. Mix Rows
D. Shift Rows
Answer» E.
7.

How_many_rounds_are_there_in_one_Whirlpool_Iteration?$

A. 3
B. 4
C. 6
D. 8
Answer» C. 6
8.

The 8 √ó 8 hash matrix holds values of siz?#

A. 16 bits
B. 32 bits
C. 8 bits
D. 4 bits
Answer» D. 4 bits
9.

The hash matrix is of the size

A. 16 √ó 8
B. 16 √ó 4
C. 8 √ó 8
D. 4 √ó 16
Answer» D. 4 ‚Äö√†√∂‚àö‚â• 16
10.

The length of the message is appended to the message. What is the size of this length?

A. 256 bits
B. 512 bits
C. 128 bits
D. 1024 bits
Answer» B. 512 bits
11.

The message is padded to

A. 1024 bits
B. 512 bits
C. Odd multiple of 256 bits
D. Odd multiple of 512 bits
Answer» D. Odd multiple of 512 bits
12.

Given a message and its n-bit hash result, the expected workload of finding a message that hashes to the same value is of the order _______________

A. 2<sup>(n/2)</sup>
B. 2<sup>(n-1)</sup>
C. 2<sup>(n)</sup>
D. 2<sup>(2n)</sup>
Answer» D. 2<sup>(2n)</sup>
13.

Given a message, the expected workload of finding a message that hashes to that value is of the order ____________

A. 2<sup>(n/2)</sup>
B. 2<sup>(n-1)</sup>
C. 2<sup>(n)</sup>
D. 2<sup>(2n)</sup>
Answer» D. 2<sup>(2n)</sup>
14.

The expected workload of generating a collision is of the order of ____________ executions of Whirlpool.

A. 2<sup>(n/2)</sup>
B. 2<sup>(n-1)</sup>
C. 2<sup>(n)</sup>
D. 2<sup>(2n)</sup>
Answer» B. 2<sup>(n-1)</sup>
15.

Which of the following is not true for whirlpool hashing function?

A. It is a two way hashing function
B. It is based on a 512 bit block cipher
C. The block cipher is similar to AES structure
D. It is resistant to differential attacks
Answer» B. It is based on a 512 bit block cipher