Question
a.
True
b.
False
c.
May be
d.
Can't say
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. SHA-3 has an advantage over other algorithms because, there is no need for table look ups, arithmetic operations or data dependent operations.
Similar Questions
Discover Related MCQs
Q. In the Theta step function, which is a substitution step, each bit value changes. Each bit is dependent on _________ other bits for its new value.
View solution
Q. Which step function provides most amount of diffusion for the Keccak iteration step?
View solution
Q. The Pi step function can be written as-
View solution
Q. The CHI step involves which of the following gate operations?
View solution
Q. Which matrix is used in the Rho/ Pi steps?
View solution
Q. What are the new co-ordinates for (x, y) in the Rho step for t =3?
View solution
Q. The Rho function is defined as : a[x, y, z] ← a[x, y, z-g(t)], where g(t) is defined as
View solution
Q. The Chi function is defined as
View solution
Q. In SHA-3, the Iota step function has a round constant which only works on the last lane.
View solution
Q. Which is the only step function that provides non-linear mapping?
View solution
Q. How many bit positions are active and can affect L[0, 0] in the Iota step function?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!