Data Integrity Algorithms Questions and Answers – Whirlpool Algorithm – III

This set of Cryptography Questions & Answers for campus interviews focuses on “Whirlpool Algorithm”.

1. Mix Row functions operate on the 8 × 8 matrix (A) to form the new matrix. The operation can be considered to be B = AC. The matrix C is formed by
a) each successive even row having left shifts
b) each successive row having a left shifts
c) each successive odd row having right shifts
d) each successive row having a right shifts
View Answer

Answer: d
Explanation: The matrix C is formed by each successive row having right shifts.

2. Which of the following hexadecimal values are not present in the matrix C of the Mix Rows function?
a) 01
b) 09
c) 05
d) 03
View Answer

Answer: d
Explanation: 03 is not a valid value in matrix C.

3. There’s no known successful attacks made against Whirlpool.
a) True
b) False
View Answer

Answer: a
Explanation: The reason for this is because the Whirlpool algorithm is a new algorithm and hasn’t been used very much.
advertisement
advertisement

4. Which hash algorithm is the most hardware intensive among the following?
a) SHA-1
b) SHA-2
c) MD-5
d) Whirlpool
View Answer

Answer: d
Explanation: None.

5. Which algorithm has the most execution latency?
a) SHA-1
b) SHA-2
c) MD-5
d) Whirlpool
View Answer

Answer: b
Explanation: Whirlpool has the lowest latency. Latency is defined by the number of iteration rounds. SHA-2 has 80 rounds, whereas Whirlpool has 10.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. Which among the following has not been broken yet( still collision free)?
a) MD-5
b) SHA-1
c) DES
d) SHA-2
View Answer

Answer: d
Explanation: SHA-2 has not yet been broken, but since SHA-1 has been found to be not collision free (and SHA-2 has the same logic as SHA-1), SHA-3 algorithm was developed and officialised in 2012.

7. Before the first round of the Whirlpool algorithm, which is the operation that takes place?
a) Addition of Key
b) Substitution of Bytes
c) Mixing of Rows
d) Shifting of Columns
View Answer

Answer: a
Explanation: Before the first round of the Whirlpool algorithm, addition of key round takes place.
advertisement

8. How many rounds does the Whirlpool algorithm undergo?
a) 12
b) 14
c) 10
d) 16
View Answer

Answer: c
Explanation: There are 10 rounds in the algorithm.

9. Each round uses a different key in the algorithm.
a) True
b) False
View Answer

Answer: a
Explanation: Whirlpool produces keys for each round using the same algorithm itself. Keys are updated per round.
advertisement

10. What is the size of the key in the algorithm?
a) 256 bits
b) 512 bits
c) 128 bits
d) 1024 bits
View Answer

Answer: b
Explanation: The size of the key is 512 bits.

11. How many add round key functions are present in the Whirlpool algorithm?
a) 16
b) 18
c) 11
d) 10
View Answer

Answer: c
Explanation: There are 11 round key addition functions in the Whirlpool algorithm. One key addition per round. One key addition before the 1st round.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Cryptography for campus interviews, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.