Data Integrity Algorithms Questions and Answers – Whirlpool Algorithm – I

This set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “Whirlpool Algorithm – 1”.

1. Which of the following is not true for whirlpool hashing function?
a) It is a two way hashing function
b) It is based on a 512 bit block cipher
c) The block cipher is similar to AES structure
d) It is resistant to differential attacks
View Answer

Answer: a
Explanation: The whirlpool algorithm is a one way hashing algorithm.

2. The expected workload of generating a collision is of the order of ____________ executions of Whirlpool.
a) 2(n/2)
b) 2(n-1)
c) 2(n)
d) 2(2n)
View Answer

Answer: a
Explanation: The expected workload of generating a collision is 2(n/2).

3. Given a message, the expected workload of finding a message that hashes to that value is of the order ____________
a) 2(n/2)
b) 2(n-1)
c) 2(n)
d) 2(2n)
View Answer

Answer: c
Explanation: The expected workload would be 2n in such a case.
advertisement
advertisement

4. Given a message and its n-bit hash result, the expected workload of finding a message that hashes to the same value is of the order _______________
a) 2(n/2)
b) 2(n-1)
c) 2(n)
d) 2(2n)
View Answer

Answer: c
Explanation: When the message and hash value are provided, the workload turns out to be 2n.

5. The message is padded to
a) 1024 bits
b) 512 bits
c) Odd multiple of 256 bits
d) Odd multiple of 512 bits
View Answer

Answer: c
Explanation: The message in Whirlpool is padded to an odd multiple of 512 bits.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. The length of the message is appended to the message. What is the size of this length?
a) 256 bits
b) 512 bits
c) 128 bits
d) 1024 bits
View Answer

Answer: a
Explanation: The length is expressed as a 256 bit unsigned integer, with most significant byte being the leftmost.

7. The hash matrix is of the size
a) 16 × 8
b) 16 × 4
c) 8 × 8
d) 4 × 16
View Answer

Answer: c
Explanation: The hash matrix has a 8 × 8 matrix.
advertisement

8. The 8 × 8 hash matrix holds values of size
a) 16 bits
b) 32 bits
c) 8 bits
d) 4 bits
View Answer

Answer: c
Explanation: 8 × 8 × 8 = 512 bits. 512 bits is the size of the message block. Thus we require 8 bits only.

9. The hash matrix of 8 × 8 is preferred over a 16 × 4 matrix because
a) it is symmetric
b) it is smaller in size
c) it is faster in computation
d) none of the mentioned
View Answer

Answer: c
Explanation: 8 × 8 is preferred because it is faster.
advertisement

10. How many rounds are there in one Whirlpool Iteration?
a) 3
b) 4
c) 6
d) 8
View Answer

Answer: b
Explanation: There are 4 rounds in each Whirlpool step.

11. Which one of these is not a Whirlpool function?
a) Add Key
b) Substitute Bytes
c) Mix Rows
d) Shift Rows
View Answer

Answer: d
Explanation: Shift columns is a valid operation. Rows are not shifted.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.