# Data Integrity Algorithms Questions and Answers – Whirlpool Algorithm – III

«
»

This set of Cryptography Questions & Answers for campus interviews focuses on “Whirlpool Algorithm”.

1. Mix Row functions operate on the 8 × 8 matrix (A) to form the new matrix. The operation can be considered to be B = AC. The matrix C is formed by
a) each successive even row having left shifts
b) each successive row having a left shifts
c) each successive odd row having right shifts
d) each successive row having a right shifts

Explanation: The matrix C is formed by each successive row having right shifts.

2. Which of the following hexadecimal values are not present in the matrix C of the Mix Rows function?
a) 01
b) 09
c) 05
d) 03

Explanation: 03 is not a valid value in matrix C.

3. There’s no known successful attacks made against Whirlpool.
a) True
b) False

Explanation: The reason for this is because the Whirlpool algorithm is a new algorithm and hasn’t been used very much.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

4. Which hash algorithm is the most hardware intensive among the following?
a) SHA-1
b) SHA-2
c) MD-5
d) Whirlpool

Explanation: None.

5. Which algorithm has the most execution latency?
a) SHA-1
b) SHA-2
c) MD-5
d) Whirlpool

Explanation: Whirlpool has the lowest latency. Latency is defined by the number of iteration rounds. SHA-2 has 80 rounds, whereas Whirlpool has 10.

6. Which among the following has not been broken yet( still collision free)?
a) MD-5
b) SHA-1
c) DES
d) SHA-2

Explanation: SHA-2 has not yet been broken, but since SHA-1 has been found to be not collision free (and SHA-2 has the same logic as SHA-1), SHA-3 algorithm was developed and officialised in 2012.

7. Before the first round of the Whirlpool algorithm, which is the operation that takes place?
b) Substitution of Bytes
c) Mixing of Rows
d) Shifting of Columns

Explanation: Before the first round of the Whirlpool algorithm, addition of key round takes place.

8. How many rounds does the Whirlpool algorithm undergo?
a) 12
b) 14
c) 10
d) 16

Explanation: There are 10 rounds in the algorithm.

9. Each round uses a different key in the algorithm.
a) True
b) False

Explanation: Whirlpool produces keys for each round using the same algorithm itself. Keys are updated per round.

10. What is the size of the key in the algorithm?
a) 256 bits
b) 512 bits
c) 128 bits
d) 1024 bits

Explanation: The size of the key is 512 bits.

11. How many add round key functions are present in the Whirlpool algorithm?
a) 16
b) 18
c) 11
d) 10

Explanation: There are 11 round key addition functions in the Whirlpool algorithm. One key addition per round. One key addition before the 1st round.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Cryptography for campus interviews, here is complete set of 1000+ Multiple Choice Questions and Answers.