This set of Cryptography Multiple Choice Questions & Answers (MCQs) focuses on “Whirlpool Algorithm”.
1. Mix Row functions operate on the 8 × 8 matrix (A) to form the new matrix. The operation can be considered to be B = AC. The matrix C is formed by
a) each successive even row having left shifts
b) each successive row having a left shifts
c) each successive odd row having right shifts
d) each successive row having a right shifts
View Answer
Explanation: The matrix C is formed by each successive row having right shifts.
2. Which of the following hexadecimal values are not present in the matrix C of the Mix Rows function?
a) 01
b) 09
c) 05
d) 03
View Answer
Explanation: 03 is not a valid value in matrix C.
3. There’s no known successful attacks made against Whirlpool.
a) True
b) False
View Answer
Explanation: The reason for this is because the Whirlpool algorithm is a new algorithm and hasn’t been used very much.
4. Which hash algorithm is the most hardware intensive among the following?
a) SHA-1
b) SHA-2
c) MD-5
d) Whirlpool
View Answer
Explanation: None.
5. Which algorithm has the most execution latency?
a) SHA-1
b) SHA-2
c) MD-5
d) Whirlpool
View Answer
Explanation: Whirlpool has the lowest latency. Latency is defined by the number of iteration rounds. SHA-2 has 80 rounds, whereas Whirlpool has 10.
6. Which among the following has not been broken yet( still collision free)?
a) MD-5
b) SHA-1
c) DES
d) SHA-2
View Answer
Explanation: SHA-2 has not yet been broken, but since SHA-1 has been found to be not collision free (and SHA-2 has the same logic as SHA-1), SHA-3 algorithm was developed and officialised in 2012.
7. Before the first round of the Whirlpool algorithm, which is the operation that takes place?
a) Addition of Key
b) Substitution of Bytes
c) Mixing of Rows
d) Shifting of Columns
View Answer
Explanation: Before the first round of the Whirlpool algorithm, addition of key round takes place.
8. How many rounds does the Whirlpool algorithm undergo?
a) 12
b) 14
c) 10
d) 16
View Answer
Explanation: There are 10 rounds in the algorithm.
9. Each round uses a different key in the algorithm.
a) True
b) False
View Answer
Explanation: Whirlpool produces keys for each round using the same algorithm itself. Keys are updated per round.
10. What is the size of the key in the algorithm?
a) 256 bits
b) 512 bits
c) 128 bits
d) 1024 bits
View Answer
Explanation: The size of the key is 512 bits.
11. How many add round key functions are present in the Whirlpool algorithm?
a) 16
b) 18
c) 11
d) 10
View Answer
Explanation: There are 11 round key addition functions in the Whirlpool algorithm. One key addition per round. One key addition before the 1st round.
Sanfoundry Global Education & Learning Series – Cryptography and Network Security.
To practice all areas of Cryptography and Network Security, here is complete set of 1000+ Multiple Choice Questions and Answers.
- Practice Cyber Security MCQ
- Check Cryptography and Network Security Books
- Check Computer Science Books
- Practice Computer Science MCQs
- Apply for Computer Science Internship